Company Description
Computer Forensics Lab is a leading provider of digital forensics services in London, specialising in computer forensics, e-discovery, cyber forensics, and data recovery. The company offers digital forensics investigations supporting various legal and investigative entities. Computer Forensics Lab helps uncover hidden digital evidence to assist solicitors, lawyers, investigators, law enforcement agencies, and companies in building credible cases supported by undisputed digital forensic evidence acquired from mobile phones, computers, social media and other digital media.
Role Description
This is a full-time on-site role for a Digital Forensics Analyst at Computer Forensics Lab in London. The Digital Forensics Analyst will be responsible for investigating and analysing data acquired from mobile phones, computers and digital media as well as conducting forensic analysis, malware analysis and handling evidence. The role requires meticulous attention to detail and the ability to uncover and interpret digital fingerprints and report writing skills in English. Graduates in digital forensics and cybersecurity with a good knowledge of Linux and Python programming are invited to apply as they will gain a lot of real-life experience in digital forensic examinations and investigations providing them with a solid base in their career journey in digital forensics and related fields.
Core Competencies & Qualifications
- Basic skills in Python programming and scripting
- Good analytical Skills and Cybersecurity knowledge
- Basic experience working with digital Evidence extracted from mobile phones, computers and other digital media
- Strong attention to detail and problem-solving abilities
- Basic knowledge of forensic procedures and chain of custody protocols
- Excellent written and verbal communication skills in English
- Familliar with Cellebrite and Magnet Forensics GreyKey and some skill in using forensic tool suites e.g., Cellebrite, XRY, Autopsy, MobilEdit, Avilla Forensics, Sleuthkit, FTK etc. (Training will be provided.)
- Basic Skills in recovering data from Nand flash, SSD and memory stick, memory card and chip-off methods using open source and commercial tools and hardware, NAND Adapters by Rusolut and Ace Lab PC3000. (Training will be provided.)
- Basic knowledge of data carving tools and techniques (e.g., Foremost, Recovery Explorer, R-Studio, PC 3000). (Training will be provided.)
- Basic knowledge of anti-forensics tactics, techniques, and procedures.
- Good knowledge of concepts and practices of processing digital forensic data.
- Skill in preserving evidence integrity according to standard operating procedures or national standards.
- Skill in conducting forensic analyses in multiple operating system environments (e.g., iOS, Android, MacOS, Linux, Windows).
- Skill in analysing volatile data (e.g. Live memory acquisition and analysis)
- Skill in processing digital evidence, to include protecting and making legally sound copies of evidence.
- Ability to conduct forensic analyses in and for both Windows and Unix/Linux environments.
- Skill in identifying obfuscation techniques as well as some basic skills in interpreting results of debuggers to ascertain tactics, techniques, and procedures.
- Skill in conducting bit-level data analysis.
- Skill in analysing memory dumps to extract information.
- Skill in deep analysis of captured malicious code (e.g., malware forensics).
- Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump, 010 Editor).
- Skill in recovering data from iPhone and Android Phones using open source and commercial tools