First Bank of Nigeria Limited (FirstBank) is Nigeria's largest financial services institution by total assets and gross earnings. With more than 10 million customer accounts, FirstBank has over 750 branches providing a comprehensive range of retail and corporate financial services. The Bank has international presence through its subsidiaries, FBN Bank (UK) Limited in London and Paris, FBNBank DRC, FBNBank Ghana, FBNBank Gambia, FBNBank Guinea, FBNBank Sierra-Leone and FBNBank Senegal, as well as its Representative Offices in Johannesburg, Beijing and Abu Dhabi.
We are recruiting to fill the position below:
Job Title: Team Member, Digital Forensic Investigator
Job Identification: 1351 Location: Lagos
Employment Type: Full Time
Job Objective(s)
Forensic investigation and analysis of digital evidence related to cybersecurity incidents, data breaches, or other digital crimes,using specialized tools and techniques to recover, preserve, and examine electronic data for legal or investigative purposes
Thorough investigation of cryptocurrency exchanges, blockchain networks,and digital asset portfolios.
Duties & Responsibilities
Act on behalf of TL, Digital Forensic Investigator in his absence.
Assist in planning investigation work
Investigate Cyber attack incident, Information security breaches and ability to present findings as expert witness in the court of law
Gather and preserve electronic evidence from computers, mobile devices, servers, and other digital sources in a forensically sound manner
Determine the causative factors of assigned incidents, learning points and corrective measures to prevent recurrence.
Research on new threats, possesses skills to examine networks and software for flaws
Conduct in-depth analysis of digital data to identify potential security breaches, unauthorized access, or other malicious activities
Use specialized forensic software and tools to extract, recover, and analyse digital evidence, including deleted files, logs, metadata, and network traffic.
Execute shared services functions such as data extraction (from a myriad of data sources)
and analysis as required by other units in Internal Audit Department.
Participate in incident response activities to identify the root cause of security incidents and recommend remediation actions
System incident review and reporting
Conduct comprehensive investigation on crypto currency exchanges, blockchain networks, and digital asset portfolios to ascertain findings and root causes of incidents
Ability to serve as expert witness on cyber incident investigation.
Perform forensic analysis of block chain transactions to detect fraudulent activities , money laundering, and other illicit behaviours
Comply with the principles and policies in the Information Security Handbook
Job Requirements
Education:
Minimum Education: First Degree (preferably science or numerate), Higher degrees/professional certification (preferably CEH, CHFI, CISSP, CPA, CFE,CISA and/or other relevant digital forensics certifications)
Experience:
Minimum experience – 1 year in IT, digital forensics investigation, IT Audit etc.
Key Competency Requirements:
Knowledge:
Information and Communication Technology
Audit/investigations Knowledge
Digital forensic techniques, tools, and methodologies for data recovery, analysis, and preservation.
Understanding of cybersecurity principles, threats, and attack vectors.
Familiarity with operating systems (Windows, Linux, macOS), file systems, and network protocols.
Forensic Tools Mastery: Experience with digital forensic tools such as EnCase, FTK, Autopsy, and Volatility.
Solid understanding of blockchain technology , cryptocurrency protocols, and cryptographic principles.
Skill / Competencies:
Business Analysis,
Internal Control/ Audit
Risk Control & Governance
Investigation processes in computer forensics
Legal issues involved in cybercrime investigations
Searching evidence
Methodologies of Acquisition and seizing Digital evidence
Electronic crime scene evaluation
Electronic evidence preservation
Steganography
Investigating password attacks
Volatile and non-volatile information gatherings
Investigate log files and determining the root cause
Investigation of attacks on wireless and related issues
E-mail crimes, its investigation and recovery of deleted emails
Data Gathering and Analysis
Process Improvement
Business Continuity Management
Information Systems Audit
IT Governance
Information Security
Channels Management
Project Management
Network Administration
Hardware Configuration
System Development
Database Design And Administration.
Application Closing Date
22nd April, 2025 (10:00 AM).