Sign In
 [New User? Sign Up]
Mobile Version

Manager, High Tech Investigations

Prudential


Location:
Newark, NJ
Date:
03/24/2017
Job Code:
399858
Prudential
Apply on the Company Site
  •  
  • Save Ad
  • Email Friend
  • Print
  • Research Salary

Job Details

Position Title: Manager, High Tech Investigations
Job Code: 399858
Job Location: New Jersey-Newark
Description:

We are a Fortune 100 financial services leader with a dynamic and diverse workforce and a strong emphasis on talent management.  Our High Tech Investigations Unit is seeking an experienced individual for the position of Manager, High Tech Investigations Unit.  In this capacity, the manager is responsible for conducting end-to-end investigations and cyber incident response into incidents of, but not limited to: cyber-crimes, privacy breaches, reported data loss, intellectual property theft, malicious network activity, misuse of company resources, conflicts of interest, violations of the Digital Millennium Copyright Act (DMCA), and violations of Prudential’s internal policies and procedures. 

 

This position requires the ability to: conduct forensic examinations of Microsoft/Apple/Linux hosts, Android/iPhone/Blackberry mobile devices, network and security devices and associated log files, conduct subject interviews, and write clear and concise findings reports for management and stakeholders. The manager provides specialized support by gathering, handling, examining, preparing, entering, searching, retrieving, identifying and/or comparing digital and/or physical evidence. The manager uses forensically sound procedures to determine results. The manager observes proper evidence custody and control procedures, documents procedures and findings and prepares comprehensive written notes and reports. 

 

The manager will have the opportunity to identify new tools and methods for proactively identifying misconduct involving computer technology, as well as review and update the group’s Standard Operations Procedures.  When needed, the manager will be required to assist in the collection of electronically stored information (ESI) in support of the firm’s eDiscovery practices.  The successful candidate will possess strong technical and interpersonal skills, will provide technical subject matter expertise and will have proven ability to handle multiple high-profile matters and to work under pressure with minimal supervision. 

 

Roles and Responsibilities:

  • Lead highly sensitive, complex, and confidential high-tech investigations into incidents of data loss and intellectual property theft, technology misuse, conflict of interest, external fraud and other types of matters.

  • Conduct forensic examinations of digital evidence in support of other investigations

  • Examine malicious software (malware) in support of investigations
  • Conduct and memorialize investigative interviews
  • Assist in the collection of electronically-stored information
  • Conduct outreach to business partners

 


 

  • Over 7 years professional experience, including at least five years of technical investigations experience, a minimum of two years involving financial services investigations
  • Proven experience in computer evidence seizure, computer forensic analysis, and data recovery on Windows, Apple and Linux-based systems and devices
  • Proven experience in computer evidence seizure, computer forensic analysis, and data recovery on Android, iOS and Blackberry-based mobile devices
  • Proven experience in conducting investigative interviews, including writing memorandums of interviews.  Formal interview training is preferred.
  • Experience using EnCase or similar forensic tools
  • Experience in computer intrusion analysis and incident response
  • Experience with analysis of security events from multiple sources including but not limited to events from Security Information Monitoring (SIEM) tools, network and host based intrusion detection systems, firewall logs, system logs (Unix and Windows), mainframes, mid-range, applications, and databases. 
  • Experience with and knowledge of typical attack vectors, network exploitation techniques, and exfiltration channels
  • Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
  • Knowledge and experience with personal computers, mobile devices, and server hardware, including RAID networked drive storage systems
  • Excellent analytical and problem solving skills
  • Excellent communications skills, both written and oral are critical
  • Experience with computer network surveillance/monitoring
  • Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology).
  • EnCE , ACE, CFCE, CISSP, or similar industry-accepted certifications
  • Knowledge of and experience using Blue Coat Reporter or similar Internet proxy reporting tools
  • Familiarity with open source intrusion detection systems (IDS) such as snort and Bro IDS
  • Experience and/or certifications with industry digital forensic tools such as EnCase, X-Ways, FTK, F-Response, and/or open source tools
  • Advanced understanding of Windows and Linux operating systems
  • Knowledge of and experience with eDiscovery methodology, best practices, and processing and review platforms (Clearwell, preferred)
  • Experience with audio enhancement software
  • Familiarity with automation surrounding large collections of data and parsing data
  • Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
  • Strong knowledge of IBM’s Lotus Notes platform, especially of available forensic artifacts
  • Ability to conduct in-depth analysis of malicious document files, malicious and protected executables, web-based malware, and malicious browser scripts. 
  • Experience with code and behavioral analysis of malware including building test environments and using debuggers, disassemblers, sniffers, and other useful tools
  • Understanding of Windows x86 Assembly code concepts for reverse-engineering
  • Knowledge and experience of mobile malware and related investigations
  • Advanced experience with Python scripting language; Additional languages a plus
  • Experience with applications including WireShark, RegShot, Process Explorer, IDA Pro, OllyDbg
  • Experience with dynamic, static and memory malware analysis
  • Experience with malware reverse engineering
  • Experience with scripting languages
  • Recent and basic programming experience

Prudential is a multinational financial services leader with operations in the United States, Asia, Europe, and Latin America. Leveraging its heritage of life insurance and asset management expertise, Prudential is focused on helping individual and institutional customers grow and protect their wealth. The company's well-known Rock symbol is an icon of strength, stability, expertise and innovation that has stood the test of time. Prudential's businesses offer a variety of products and services, including life insurance, annuities, retirement-related services, mutual funds, asset management, and real estate services.

We recognize that our strength and success are directly linked to the quality and skills of our diverse associates. We are proud to be a place where talented people who want to make a difference can grow as professionals, leaders, and as individuals. Visit www.prudential.com to learn more about our values, our history and our brand.

Prudential is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, genetics, disability, age, veteran status, or any other characteristic protected by law.

Note that this posting is intended for individual applicants. Search firms or agencies should email Staffing at staffingagencies@prudential.com for more information about doing business with Prudential.
Job Function: Legal
Schedule: Full-time
Apply on the Company Site

Featured Jobs[ View All ]

Featured Employers [ View All ]