Navigant Managing Consultant - Incident Response, Information Security and Forensics - Legal Technology Solutions - Remote Locations in BOSTON, Massachusetts
Navigant Consulting, Inc. (NYSE: NCI) is a specialized, global professional services firm that helps clients take control of their future. Navigant’s professionals apply deep industry knowledge, substantive technical expertise, and an enterprising approach to help clients build, manage and/or protect their business interests. With a focus on markets and clients facing transformational change and significant regulatory or legal pressures, the Firm primarily serves clients in the healthcare, energy and financial services industries. Across a range of advisory, consulting, outsourcing, and technology/analytics services, Navigant’s practitioners bring sharp insight that pinpoints opportunities and delivers powerful results. More information about Navigant can be found at navigant.com.
Our Information Security (IS) Services team is a rapidly growing part of the Global Legal Technology Solutions segment of our business. Our professionals help our clients address their critical information security challenges, including incident investigation/response, as well as assessing and reducing information security risks.
Navigant is a preferred provider of data management and analysis services to law firms and corporate legal teams associated with government investigations, internal investigations and complex litigation. Navigant has advised and supported clients on numerous types of matters including banks addressing regulatory investigations, banking class action litigation matters, TCPA litigation, healthcare insurer class action litigation, healthcare regulatory investigations, data breach response and other litigation, regulatory and management consulting matters.
This role can be based in any of the following locations: Remote; Chicago, IL; Washington, DC; New York, NY.
Participate in security incident investigations that involve computer crimes and require log, forensic and malware analysis
Collect and analyze intrusion detection system alerts, firewall logs, network traffic logs and host system logs to evaluate whether unauthorized access or information ex-filtration occurred
Perform forensic analyses to identify the presence of any malware, malware capabilities/actions and what actions the malware took
Conduct security investigations in Linux and/or Windows environments
Provide input into client communications, both written and oral, related to analyses performed for senior level review
Approximately 5-7 years of experience working in the Incident Response space
Able to communicate effectively and concisely with high level management and C-suite clients on a frequent basis
Understanding of how to leverage existing security applications and appliances to address a compromise or malware/ransomware outbreak
Ability to approach projects both from a long-range and immediate view
Experience working with non-Windows programs (such as Linux, Unix, Mac)
Scripting/programming experience (specifically Python, C#, VBA, or Shell)
Experience working on projects in an investigatory capacity – either law enforcement or incident response
Understanding of mitigation and clean-up strategies
Strong desire to work on a team in a collaborative environment to achieve common goals
Proficient in log analysis of multiple types
Ability to correlate events from multiple sources to create a timeline analysis across end points of an incident
Exceptional organizational skills, to include detailed note taking abilities
Passion for the sport of Incident Response, and a desire for continuous improvement in expertise
Experience working with Enterprise networks (specifically CCNA/CCNP security)
Ability to evaluate customer needs and translate that into solutions – from both a technical and project management perspective
Understanding of how to take malware apart from a virtual machine, dynamic malware analysis, and reverse engineering perspective
Memory analysis skills a plus
Ability to analyze complex network packet captures
Undergrad or Master’s Degree in Computer Science/Cyber Security/MSIS or equivalent work experience
Frequently communicates with clients and coworkers and must be able to share information effectively
Strong conceptual, as well as quantitative and qualitative analytical skills
Work as a member of a team as well as be a self-motivator with ability to work independently
Flexibility and responsiveness in managing multiple projects in sometimes high-pressure situations simultaneously
Able to travel via airplane with minimal assistance to client sites across the US and potentially internationally
Usually remains stationary for the majority of the day
Regularly uses close visual acuity and operates computer equipment to prepare and analyze and transmit data
The company offers competitive compensation packages including an incentive compensation plan, comprehensive medical/dental/life insurance, 401(k) and employee stock purchase plans.
Navigant does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Navigant and Navigant will not be obligated to pay a placement fee.
Navigant is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, citizenship status, protected veteran status, religion, creed, physical or mental disability, medical condition, marital status, sex, sexual orientation, gender identity or expression, age, or any other basis protected by law, ordinance, or regulation.