and respond to that threat. Responsibilities Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response. Digitalforensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being … proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and … dynamic malware analysis/reverse engineering, advanced mobile device forensics Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF)/AXIOM, TZWorks, and/or Cellebrite Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling more »
and respond to that threat. Responsibilities Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response. Digitalforensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being … proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and … dynamic malware analysis/reverse engineering, advanced mobile device forensics Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF)/AXIOM, TZWorks, and/or Cellebrite Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling more »
individual with a solid background in Security Engineering preferably with a degree in a security related field (ie. network engineering, computer science, penetration testing, digitalforensics) and strong technical knowledge across various security pillars (network/cloud/infrastructure/email/endpoint). To be considered for … . Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, DigitalForensics, Network Engineering, Computer Science). Strong technical knowledge across various Security Engineering pillars (Network Security, Cloud Security, Infrastructure Security, Email Security and more »
individual with a solid background in Security Engineering preferably with a degree in a security related field (ie. network engineering, computer science, penetration testing, digitalforensics) and strong technical knowledge across various security pillars (network/cloud/infrastructure/email/endpoint). To be considered for … . Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, DigitalForensics, Network Engineering, Computer Science). Strong technical knowledge across various Security Engineering pillars (Network Security, Cloud Security, Infrastructure Security, Email Security and more »
incident response processes and methodologies. Responsibilities Manage and co-ordinate cyber security incidents for their clients, working closely with the head of cyber response. Digitalforensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being more »
including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security … via WSA. Experience conducting investigations using EDR/XDR tools like CrowdStrike and MS Defender to investigate Windows/Linux systems. Proficiency in Memory Forensics, dump extraction, and analysis. Qualifications: Essential: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Desired: Master's degree in more »