Job Description - Digital Forensic Analyst

www.data64.in

contents

Life @ data64

Some of our Global Achievements

Introduction to the Cyber Tribe

Personal Profile Form

Some of our Indian Achievements

What we do @ data64

Job Description

Salary & Selection Process

Online Test Curriculum

a few months before the landmark Information Technology Act was passed. Led. shots of espressos and four bright young minds. established in 2012 to handle all Cyber Tribe operations in Mumbai and Gujarat. a STEP promoted by the Department of Science & Technology. digital evidence. Data64 Techno Solutions Pvt. ASCL Law School emerged introducing students and professionals to the progressive face of financial and corporate law. created to promote life skills above and beyond conventional education . Corporates felt the need for cutting edge consultancy in Digital Evidence Analysis and Incident Response. Lexcode Regulatory Compliance Technologies Pvt. Ltd. Association of Digital Forensic Investigators has been created as a member driven organization to develop and design standards and best practices for all areas of digital forensic investigation. the IT industry witnessed explosive growth. a dynamic law firm specializing in technology laws. the inclusion of computers in the lives of children brought forth the need for life skills for youngsters.announced its birth. in the right direction by social changes. established in 2011 to develop high quality technological solutions for legal compliance. As the face of cyber law changed to make it an inseparable part of other facets of law.Cyber Tribe (born 1999) Soaring temperatures. Ltd.. as we were. Cyber Tribe consists of 8 organizations It was in the year 2000 that Asian School of Cyber Laws was born in India.. Ltd. Thus was born. Data64 Technologies Pvt. incubated by Science and Technology Park. Very soon.a revolution with a mission to: empower the citizens of the world through cyberspace. Then came TechJuris Law Consultants. . Government of India. technology contracts and Internet based businesses. That's what led to the birth of CyberTribe in 1999 . Republic of Cyberia a virtual nation for youngsters.

.

.

What we do @ data64 .

recovery of information system functions using alternate equipment. 7. A formal policy provides the authority and guidance necessary to develop an effective contingency plan. Contingency planning refers to interim measures to recover information system services after a disruption. procedures. . Measures taken to reduce the effects of system disruptions can increase system availability and reduce contingency life cycle costs. 4. Because information system resources are so essential to an organization’s success. Develop the contingency planning policy statement. and exercises. Contingency planning supports this requirement by establishing thorough plans. 5. Contingency planning is unique to each system. A template for developing the BIA is provided to assist the user. 1. Conduct the business impact analysis (BIA). 7-step process contingency planning 2. Create contingency strategies. training. the activities improve plan effectiveness and overall organization preparedness. Identify preventive controls. The plan should be a living document that is updated regularly to remain current with system enhancements and organizational changes. combined. or performance of information system functions using manual methods. The contingency plan should contain detailed guidance and procedures for restoring a damaged system unique to the system’s security impact level and recovery requirements. whereas training prepares recovery personnel for plan activation and exercising the plan identifies planning gaps.Contingency Planning Data64 assists organisations in designing contingency plans. Thorough recovery strategies ensure that the system may be recovered quickly and effectively following a disruption. The BIA helps identify and prioritize information systems and components critical to supporting the organization’s mission / business functions. 3. Develop an information system contingency plan. 6. Testing validates recovery capabilities. providing appropriate preventive measures. it is critical that identified services provided by these systems are able to operate effectively without excessive interruption. and technical considerations. Ensure plan maintenance. Information systems are vital elements in most mission/business functions. Interim measures may include relocation of information systems and operations to an alternate site. recovery strategies. and technical measures that can enable a system to be recovered as quickly and effectively as possible following a service disruption. Ensure plan testing.

After processing. The production process involves opposite parties meeting and agreeing to which documents should be produced in what format. Finally. where multimedia files need to be exhibited. lawyers have to present exhibits in native format. Analysis is carried out post review and analytical tools used for this purpose have become more sophisticated. E-discovery is a techno-legal process in which relevant evidence to be produced in a court of law is identified. Since the e-discovery process may involve huge amounts data and it may be unclear what data is relevant in the beginning of a legal dispute. During processing. finding out the exact nature of data identified. analyzed and presented from a large set of electronic information. Here. people. analysis and validation can be carried out and an appropriate chain of custody maintained. Identification requires thorough investigation and analysis. data has to be presented. proportionate and auditable. After analysis. Specific e-discovery processes have already been incorporated into the law in the United States where companies have to comply with such processes. it has to be collected. potentially relevant data should be identified and protected in a manner which is legally defensible. and 3. This is critical since the review process identifies which documents to produce and which documents to hold back. . reduce the amount of data that will finally be produced in a court of law by narrowing down the appropriate data for review. It then requires involvement of the technical teams to procure the data in the agreed format. the identification process should anticipate change and have procedures which can accommodate newly discoverable data. Although. Where there is a need to recover deleted or formatted data. data is produced. Identification may include various departments. 2. e. integrated cyber forensics tools may also be put to use. When a legal duty to preserve data (ediscovery) is initiated.g. the legal team has a greater role to play and can expect to obtain a better understanding of the facts.eDiscovery Data64 provides information management consulting for electronic discovery processes. Data collection should also be done in a manner which follow the earlier principles of defensibility. Once data has been identified. data has to be converted to more accessible file formats and individual files may be inventoried along with their metadata. data may require processing with a view to: 1. proportionability and auditability. Processing must be such that audit. computers and files or documents in paper form. which is done by lawyers. certain cases. electronic documents are mostly presented to a court of law in paper form. Legal strategy is determined and developed based on document review. After collection. documents have to be reviewed. collected.. record all metadata (in each and every file) prior to processing.

consumer electronic devices. personal digital assistants (PDA). and acquiring data from the possible sources of relevant data. and providing recommendations for improvement to policies. and assessing and extracting data of particular interest. 4. computing peripherals. while preserving the integrity of the data. Digital forensics. and conducting regular reviews of forensic policies and procedures. is the application of science to the identification. and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data. labeling. to derive useful information that addresses the questions that were the impetus for performing the examination.. forensic examination of additional data sources. performing monitoring. and other aspects of the forensic process. Integrating Forensic into Incident Response Techniques Organizations should ensure that their policies contain clear statements addressing all major forensic considerations. such as contacting law enforcement.g.Digital Forensic Investigation Data64 provides digital forensic and cyber investigation services. and various types of media. Data refers to distinct pieces of digital information that have been formatted in a specific way. procedures. which may include describing the actions used. Examination: forensically processing collected data using a combination of automated and manual methods. 3. using legally justifiable methods and techniques. recording. 2. Analysis: analyzing the results of the examination. collection. Organizations have an ever-increasing amount of data from many sources. among other sources. also known as computer and network forensics. data can be stored or transferred by standard computer systems. networking equipment. based on . securing identified vulnerabilities. examination. while following procedures that preserve the integrity of the data. Organizations should ensure that their policies and procedures support the reasonable and appropriate use of forensic tools. Reporting: reporting the results of the analysis. tools. Digital Forensics Process The process for performing digital forensics comprises the following basic phases: 1. Organizations should create and maintain procedures and guidelines for performing forensic tasks. For example. improving existing security controls). Collection: identifying. determining what other actions need to be performed (e. Organizations should ensure that their IT professionals are prepared to participate in forensic activities. explaining how tools and procedures were selected. collection and the organization’s policies and all applicable laws and regulations.

Additionally. Additionally. financial information. 2011 issued by the Central Government in exercise of the powers conferred by clause (ob) of subsection (2) of section 87 read with section 43A of the Information Technology Act. . Failure to comply with these obligations may be penalized with fines. regulations. physical. compensation and even imprisonment. The data privacy rules define sensitive personal data or information to include passwords. in some cases there may be liability under section 43A of the Information Technology Act. physiological and mental health condition. 1 crore. 2000. 25. Under the original Information Technology Act. ita64 is a suite of technological solutions for facilitating Information Technology Act compliance. orders etc impose several obligations on corporates. compensation claims were restricted to Rs. priv64 is a cutting edge technological solution that automates the data privacy legal compliance process. This section provides for imprisonment upto 3 years and / or fine upto Rs 5 lakh. sexual orientation. open exchange of data from entities about how and when they are suffering cyber attacks on their systems. Non-compliance with any of the provisions of the data privacy rules is penalized with a compensation /penalty of upto Rs. Now claims upto Rs 5 crore are under the jurisdiction of Adjudicating Officers. ita64 comprises modules: the following 3 priv64: The primary law for data privacy in India is the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules. dx64: facilitates real-time. This data is analyzed to provide earlywarning of cyber attacks that could bring down critical infrastructure. in some cases there may be liability under section 72A of the Information Technology Act. 2000. Claims above Rs 5 crore are under the jurisdiction of the relevant courts. cert64: facilitates 100% compliance with CERT and other reporting requirements.Information Technology Act Compliance Data64 has developed technological solutions to enable corporates to manage regulatory compliance under the Information Technology Act The Information Technology Act and its allied rules. Manual compliance with the stringent data privacy laws would not only be extremely time-consuming but also would require a lot of people and expense. medical records and history and biometric information.000 under section 45 of the Information Technology Act.

here at CyberTribe. . Great people..don't apply at data64.. Stars: At CyberTribe. Whether its iceberg or router. Now you get to choose your own 'handle' name. We are all very hard working people who love their work. Mentor-Protege Relationship: Everyone (except the Chief Architect) at the CyberTribe is assigned a mentor. each person is looked at as someone who is destined to shine -a star! To underline this philosophy. No one calls you by your name. Handles: We.. sub-zero office politics and lots more great stuff. have taken measures to do away with the conventional concept of hierarchy at work. If you prefer a 9 to 5 job with regular holidays. virtually no hierarchy. Very generous pay packages. it is absolutely prohibited to refer to anyone at CyberTribe as an 'employee'. every Star is addressed by his/her handle. it is absolutely prohibited to refer to anyone at data64 as an 'employee'. Your parents named you when you were born.. choose a name that defines you! Awesome work atmosphere. So. who brings out the 'star' in the protege. This helps us create a culture of openness that breaks the barriers of hierarchy. each person is looked at as someone who is destined to shine -a star! To underline this philosophy... If you get a comparable job that pays better.take it !! Insane work hours.Life @ data64 At data64..

Join us as a Digital Forensic Analyst Job Code: DFA-Data64 .

improving existing security controls). . sexual orientation or citizenship. promotion.Tech in Computer Science or IT or Electronics with no current backlogs. collection. For example. while preserving the integrity of the data. and other aspects of the forensic process. securing identified vulnerabilities. sex. Organizations have an ever-increasing amount of data from many sources. examination. among other sources. national origin. gender identity. also known as computer and network forensics. Examination: forensically processing collected data using a combination of automated and manual methods. age. determining what other actions need to be performed (e. religion. Reporting: reporting the results of the analysis. salary. 2. including recruitment. Students of the 2012 batch of B. 3. Ability to write and speak English very well.g. and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data. procedures. and providing recommendations for improvement to policies. selection. pregnancy. and acquiring data from the possible sources of relevant data. recording. data can be stored or transferred by standard computer systems. labeling. marital status. This policy applies to all employment practices. networking equipment. Core Functions Product Development Reporting Analysis Examination Consulting Online Marketing Training Collection Business Development Digital Forensics Process The process for performing digital forensics comprises the following basic phases: 1. Business Development. Eligibility: 1. ancestry. color. computing peripherals. which may include describing the actions used. tools. is the application of science to the identification. while following procedures that preserve the integrity of the data. training and development and demotion. using legally justifiable methods and techniques. examination. 4. forensic examination of additional data sources. to derive useful information that addresses the questions that were the impetus for performing the collection and examination. explaining how tools and procedures were selected. A Digital Forensic Analyst specializes in collection. we have a very flat structure and every star is a part of five core functions.E or B. and various types of media. transfer. Apply if you: + are very patient by nature + are detail oriented and persistent + are an innovative thinker and problem solver Data64 Non-Discrimination Statement It is the policy of Data64 not to engage in discrimination against or harassment of any person employed or seeking employment with Data64 on the basis of race. which are – Consulting. Collection: identifying. As an organization. analysis and reporting of digital evidence. personal digital assistants (PDA). Online Marketing and Training.. Data refers to distinct pieces of digital information that have been formatted in a specific way. Product Development. consumer electronic devices. and assessing and extracting data of particular interest. merit increase. 2. Analysis: analyzing the results of the examination.Digital Forensic Analyst Job Code: DFA-Data64 Digital forensics.

000 per annum depending upon your performance. 2. Pre-placement Talk The pre-placement talk will be delivered by Data64 at empanelled colleges and will focus on our organisational history of the company. salary and compensation process.50. You will be entitled to a CTC of either INR 6. however. 6. Data64 will not provide or reimburse any accommodation or travel expenses during this period. you are required to travel on official business during this period.Digital Forensic Analyst Selection Process Group Discussion Personal Interview Confirmation Pre-placement talk Online Test On-job Training 1. you may be required to relocate to any other city. 3. your growth prospects.000 (Indian Rupees Fourteen Thousand) per month during this training. online test and personal interview. We will evaluate your verbal communication skills. clarity of thought and awareness of Indian and global current affairs in this round. you may be selected for 8 month on-job training. 5. During this period. candidates are divided into groups of 12 or less and given a topic to discuss. Group Discussion During this round. 4. candidates who clear the group discussion round.00. what we do.000 or INR 8.(1) the Data64 Personal Profile Form filled in by you (2) Topics of the online test. Confirmation On successful completion of the on-job training. we primarily focus on two issues . Alumni of the ASCL Certified Digital Evidence Analyst course are exempt from this online test. are administered a 60 minute online test. The detailed syllabus for this is provided under the section "Curriculum for Online Test for DFA Recruitment". you will be designated as a Data64 Digital Forensic Analyst. On-job Training Based upon your performance in the group discussion. Online Test During this round. those expenses will be borne by or reimbursed by Data64. If. selection process. You will be entitled to a stipend of INR 14. Personal Interview During this round. .

To get started on this. "Purple Cow: Transform Your Business by Being Remarkable" by Seth Godin Life Skills You are expected to read and understand the underlying concepts of the following books: 1.in/work_with_us/download. "Freakonomics: A Rogue Economist Explores the Hidden Side of Everything" by Steven Levitt and Stephen J. HTML5 and JavaScript. Online Marketing You are expected to be proficient in using facebook.data64. "Outliers: The Story of Success" by Malcolm Gladwell. MySQL. you can download some eBooks and the trial version of Winhex 16.data64. Zen Cart and MediaWiki. "The 80/20 Principle .4 or above.zip You are also expected to read and understand the underlying concepts of the following books: 1. 4. "The Tipping Point: How Little Things Can Make a Big Difference" by Malcolm Gladwell. Dubner. you can download these eBooks from: http://www. PhpBB. Additionally you are expected to have a basic working knowledge of WinHex 16.in/work_with_us/download. 5.Curriculum for Online Test for DFA Recruitment Digital Forensics You are expected to have a basic understanding of computer security incident handling. "Buyology: Truth and Lies About Why We Buy" by Martin Lindstrom 2. .4 from: http://www. You are also expected to be conversant with open source platforms such as Wordpress. A Geek's Guide to promoting yourself and your online business in 140 characters or less with Twitter 3. Additionally you are expected to read the following eBooks: 1. Marketing and Advertising Using Google 2. twitter and linkedin. Unleashing the Ideavirus To get started on this. 3. especially from a social media marketing and business development point of view.The secret of achieving more with less" by Richard Koch 2. "Blink: The Power of Thinking Without Thinking" by Malcolm Gladwell.zip Programming You are expected to have a good working knowledge of web development using PHP. forensic techniques and contingency planning.

Data64 Personal Profile Form .

in your opinion. Your parents named you when you were born. What's wrong with the education system? How would you fix it if you had the power to do so? What. date of birth. Now you get to choose your own 'handle' name. Your name. contact information. Draw or write something interesting in this space. facebook username.Page 1 of 4 of Data64 Personal Profile Form Data64 Job Code(s) applied for. What handle name would you choose for yourself and why? What's your favourite sport? Why? Your academic background. sets you apart from the crowd? .

why do you continue to do them? Why are you suitable for this job? What are the 3 things that you hate about yourself? Have you done anything to change these? What would you do if you become invisible for a day? What kind of people do you hate the most? Describe one incident where you have exhibited leadership qualities. .Page 2 of 4 of Data64 Personal Profile Form Which animal would you like to be reborn as? Why? What are the weirdest things you do? If you know they are weird.

Page 3 of 4 of Data64 Personal Profile Form How do you like to spend a day off? What is a common misperception about you? When is it okay to break the rules? How does this job relate to what you really want to be doing in your life? How do others describe you? Where do you see yourself in three years? If you were hired. what do you think the title should be? . with whom would it be? Why? If someone wrote a biography about you. what ideas / talents could you contribute? If you could trade places with any other person for a week.

Give 3 reasons why you are suitable for this job. what would you do with the time? What have you done to develop or change yourself in the last few years? Give 3 reasons why you are NOT suitable for this job. your mom or dad? Why? When is it NOT okay to break the rules? What kind of people do you like? What makes you angry? If you had only six months left to live.Page 4 of 4 of Data64 Personal Profile Form In the news story of your life. what would the headline say? Who do you like best. .

Mumbai .in | info@data64. Pride Senate.110019 Contact Numbers 09212227459 08800677554 08800679555 08800644557 www. College. EROS Corporate Tower. H. Senapati Bapat Road. Opp. Churchgate. Pune . Dinshaw Wachha Road.411016.data64. Nehru Place.R.400020 Contact Numbers 9594996366 9594996363 9594996364 (022) 22814502 (022) 22814503 (022) 66300223 Delhi (Liaison Office) 15th Floor.Data64 Techno Solutions Pvt. Pune 6th Floor. Ltd. Behind Sigma House.com . India Contact Numbers 020-25667148 020-40033365 020-65206029 Mumbai 7 Vaswani Mansions. New Delhi .

Sign up to vote on this title
UsefulNot useful