Key Responsibilities
Preparedness & Prevention
- Participate in tabletop exercises, simulations, and red/blue team activities.
- Recommend enhancements to security controls based on incident trends.
- Assist in vulnerability and risk assessments to strengthen overall cyber defenses.
Incident Detection & Response
- Monitor security alerts, logs, and threat intelligence feeds to identify potential incidents.
- Triage and classify security events based on severity and impact.
- Lead incident response actions, including containment, eradication, and recovery.
- Coordinate with IT, SOC, and external partners to resolve security incidents efficiently.
Threat Analysis & Investigation
- Conduct deep-dive investigations using SIEM, EDR, and network analysis tools.
- Perform memory, log, malware, and packet analysis when required.
- Identify root cause, attack vectors, and threat actor techniques (MITRE ATT&CK aligned).
- Document artifacts, timelines, and findings in a structured forensics workflow.
Digital Forensics
- Collect, preserve, and analyze digital evidence for internal investigations.
- Support legal, compliance, and HR teams during investigations when required.
- Maintain forensic toolsets, imaging processes, and chain-of-custody procedures.
Reporting & Communication
- Provide clear, actionable incident reports for both technical and executive audiences.
- Communicate incident impact and remediation progress to stakeholders.
- Maintain accurate and detailed incident response documentation.
Qualifications
Required Qualifications
- Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent experience.
- 2–5+ years of experience in incident response, SOC analysis, or digital forensics.
- Hands-on experience with SIEM, EDR, IDS/IPS, network security tools, and forensic toolsets.
- Strong understanding of:
- TCP/IP, networking fundamentals
- Operating system internals (Windows, Linux, macOS)
- Malware behaviors and intrusion techniques
- MITRE ATT&CK framework
- Ability to work under pressure during high-severity incidents.
Preferred Qualifications
- Relevant certifications such as:
- GCIH, GCIA, GCFA, GREM
- CEH, CySA+, Security+
- OSCP, OSDF, or similar
- Experience with cloud platforms (AWS, Azure, GCP).
- Experience working in enterprise SOC environments.
Soft Skills
- Excellent analytical and problem-solving abilities.
- Strong communication and documentation skills.
- Ability to collaborate effectively with cross-functional teams.
- High attention to detail and strong situational awareness.
Additional Information
What we offer:
- Work with customers from whole world.
- Work with cutting-edge security technologies.
- Opportunity to influence and improve the organization’s security posture.
- Collaborative, growth-focused team environment.
- Professional development support and certifications.
- Positive, motivating, international work environment.
- Hybrid work.
- Flexible working hours.
- Generous benefits package focused on physical and mental wellbeing (Multisport, health insurances, consulting sessions).
- Pet-friendly office.
- Social events and team bonding gatherings.
- Compensation package consisted of base + bonus and non-taxable parts, competitive in the market.
About the Company
Wherever our customers are in the world, we help them digitalise and optimise their remote business processes using advanced hybrid network solutions and digital technologies.
At Marlink, we empower our customers worldwide by helping them digitalize and optimize their remote operations through advanced hybrid network solutions and cutting-edge digital technologies. Our teams operate globally, harnessing innovation, expertise, and applied technology to connect systems and people, driving success in today’s digital-first world. With 1,500 employees in over 30 countries, and customers in the maritime, energy, and government sectors, we push boundaries to deliver excellence.
Digital Forensics & Incident Response Expert is responsible for detecting, analyzing, and responding to cybersecurity incidents. This role combines technical expertise, analytical thinking, and effective communication to rapidly contain threats, minimize damage, and strengthen the organization’s security posture. The ideal candidate has hands-on experience in incident response, threat analysis, and digital forensics.
Sponsored
Explore Security
Skills in this job
People also search for
Similar Jobs
Associate Principal/Digital Forensics, Incident Response & Cybersecurity (Forensic Services practice)
Charles River Associates
Palo Alto Networks - Associate Consultant - Digital Forensics and Incident Response, application via RippleMatch
RippleMatch Opportunities
Incident Response Analyst
Gruve
Incident Response Analyst
Gruve
Security Incident Response Manager
Stripe
More jobs at Diverto
Apply for this position
Sign In to ApplyAbout Diverto
Careers at Diverto. Find Great Talent with Career Pages. | powered by SmartRecruiters | Find Great Talent with a Career Page.
Similar Jobs
Associate Principal/Digital Forensics, Incident Response & Cybersecurity (Forensic Services practice)
Charles River Associates
Palo Alto Networks - Associate Consultant - Digital Forensics and Incident Response, application via RippleMatch
RippleMatch Opportunities
Incident Response Analyst
Gruve
Incident Response Analyst
Gruve
Security Incident Response Manager
Stripe