Navigant Managing Consultant - Incident Response, Information Security and Forensics - Legal Technology Solutions - Remote Locations in ANN ARBOR, Michigan

Navigant Consulting, Inc. (NYSE: NCI) is a specialized, global professional services firm that helps clients take control of their future. Navigant’s professionals apply deep industry knowledge, substantive technical expertise, and an enterprising approach to help clients build, manage and/or protect their business interests. With a focus on markets and clients facing transformational change and significant regulatory or legal pressures, the Firm primarily serves clients in the healthcare, energy and financial services industries. Across a range of advisory, consulting, outsourcing, and technology/analytics services, Navigant’s practitioners bring sharp insight that pinpoints opportunities and delivers powerful results. More information about Navigant can be found at navigant.com.

Our Information Security (IS) Services team is a rapidly growing part of the Global Legal Technology Solutions segment of our business. Our professionals help our clients address their critical information security challenges, including incident investigation/response, as well as assessing and reducing information security risks.

Navigant is a preferred provider of data management and analysis services to law firms and corporate legal teams associated with government investigations, internal investigations and complex litigation. Navigant has advised and supported clients on numerous types of matters including banks addressing regulatory investigations, banking class action litigation matters, TCPA litigation, healthcare insurer class action litigation, healthcare regulatory investigations, data breach response and other litigation, regulatory and management consulting matters.

  • This role can be based in any of the following locations: New York, NY; Washington, DC; Remote Locations.

  • Participate in security incident investigations that involve computer crimes and require log, forensic and malware analysis

  • Collect and analyze intrusion detection system alerts, firewall logs, network traffic logs and host system logs to evaluate whether unauthorized access or information ex-filtration occurred

  • Perform forensic analyses to identify the presence of any malware, malware capabilities/actions and what actions the malware took

  • Conduct security investigations in Linux and/or Windows environments

  • Provide input into client communications, both written and oral, related to analyses performed for senior level review

  • Approximately 5-7 years of experience working in the Incident Response space

  • Able to communicate effectively and concisely with high level management and C-suite clients on a frequent basis

  • Understanding of how to leverage existing security applications and appliances to address a compromise or malware/ransomware outbreak

  • Ability to approach projects both from a long-range and immediate view

  • Experience working with non-Windows programs (such as Linux, Unix, Mac)

  • Scripting/programming experience (specifically Python, C#, VBA, or Shell)

  • Experience working on projects in an investigatory capacity – either law enforcement or incident response

  • Understanding of mitigation and clean-up strategies

  • Strong desire to work on a team in a collaborative environment to achieve common goals

  • Proficient in log analysis of multiple types

  • Ability to correlate events from multiple sources to create a timeline analysis across end points of an incident

  • Exceptional organizational skills, to include detailed note taking abilities

  • Passion for the sport of Incident Response, and a desire for continuous improvement in expertise

  • Desired Qualifications

  • Experience working with Enterprise networks (specifically CCNA/CCNP security)

  • Ability to evaluate customer needs and translate that into solutions – from both a technical and project management perspective

  • Understanding of how to take malware apart from a virtual machine, dynamic malware analysis, and reverse engineering perspective

  • Memory analysis skills a plus

  • Ability to analyze complex network packet captures

  • Undergrad or Master’s Degree in Computer Science/Cyber Security/MSIS or equivalent work experience

  • Frequently communicates with clients and coworkers and must be able to share information effectively

  • Strong conceptual, as well as quantitative and qualitative analytical skills

  • Work as a member of a team as well as be a self-motivator with ability to work independently

  • Flexibility and responsiveness in managing multiple projects in sometimes high-pressure situations simultaneously

  • Able to travel via airplane with minimal assistance to client sites across the US and potentially internationally

  • Usually remains stationary for the majority of the day

  • Regularly uses close visual acuity and operates computer equipment to prepare and analyze and transmit data

The company offers competitive compensation packages including an incentive compensation plan, comprehensive medical/dental/life insurance, 401(k) and employee stock purchase plans.

Navigant does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Navigant and Navigant will not be obligated to pay a placement fee.

Navigant is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, citizenship status, protected veteran status, religion, creed, physical or mental disability, medical condition, marital status, sex, sexual orientation, gender identity or expression, age, or any other basis protected by law, ordinance, or regulation.