innovative leader in AI-driven audio technology, pioneering advancements in digital signal processing (DSP) and generative AI. With a cutting-edge approach to watermarking, forensicanalysis, and sound synthesis, this company is shaping the future of audio authenticity and AI-powered content creation. Their rapidly growing team collaborates … in audio signal processing and machine learning applications. This is an opportunity to work at the forefront of AI-generated sound, audio watermarking, and forensicanalysis in a fast-paced, high-impact environment. The ideal candidate will have a deep understanding of digital signal processing, machine learning, and … enhancement, synthesis, restoration, and error correction. Design and train generative AI models to create, process, and analyze audio content. Implement and refine AI-based forensic audio analysis and watermarking techniques to ensure authenticity and attribution. Collaborate with interdisciplinary teams to manage and preprocess large datasets for AI training. More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
operations and artifacts Experience with SIEM technologies, including Splunk, Microsoft Sentinel, or Elastic Experience with forensics tools, including Magnet Axiom and FTK Experience performing forensic imaging, remote collection, and forensicanalysis Experience with malware analysis, including static, dynamic, and reverse engineering Experience performing root cause analysis … all phases of the incident response lifecycle Top Secret clearance Bachelor's degree Additional Qualifications Experience acquiring memory from the host and performing memory analysis with tools, including Volatility Experience with Endpoint Detection and Response (EDR) tools, including CrowdStrike Falcon and FireEye HX Experience performing analysis of packet … attack vectors, and methods of exploitation Knowledge of intrusion set tactics, techniques, and procedures (TTPs) ACE, EnCE, GCFE, CCI, GREM, CHFI, GCFA, or CCFP Forensic Certification GIAC Continuous Monitoring (GMON), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Intrusion Analyst (GCIA), GIAC Network ForensicMore ❯
Quantico, Virginia, United States Hybrid / WFH Options
ICS Nett, Inc
CISM, CAP, CCNA Security AND ANY Forensics certification is a Must Cybersecurity Forensics Engineers are responsible for leading and overseeing all aspects of digital forensic investigations within the agency. Responsibilities include collecting, preserving, and analyzing digital evidence from various sources such as computers, networks, and mobile devices. Other responsibilities … include managing and conducting complex forensic examinations, providing expert guidance on forensic methodologies and tools, collaborating with cross-functional teams, and delivering clear and concise reports to stakeholders. Additionally, Cybersecurity Forensics Engineers are responsible for ensuring adherence to legal and regulatory requirements pertaining to digital evidence handling and … Magnet Axiom, Falcon-NEO, Cellebrite, Encase, X-Ways Forensics, Autopsy, Sleuth Kit • Experience with Wireless detection systems such as Yorkie-Pro • Experience with performing forensic imaging, remote collection, and forensicanalysis • Experience with malware analysis, including static, dynamic, and reverse engineering • Experience with SIEM technologies, including More ❯
Windsor, Berkshire, South East, United Kingdom Hybrid / WFH Options
Centrica
handle cyber incident investigations, e-Discovery, network forensics, and cyber breach inquiries. Location: Hybrid working with occasional travel to Windsor. Key Accountabilities: Carry out forensicanalysis and incident response investigations Build and manage forensic and incident infrastructure. Lead cyber forensic investigations. Support weekly security operations calls. More ❯
handle cyber incident investigations, e-Discovery, network forensics, and cyber breach inquiries. Location: Hybrid working with occasional travel to Windsor. Key Accountabilities: Carry out forensicanalysis and incident response investigations Build and manage forensic and incident infrastructure. Lead cyber forensic investigations. Support weekly security operations calls. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & ForensicAnalysis - Ability to manage and respond to security breaches, perform digital forensics, and mitigate damage through structured incident response processes. Risk Management & Compliance … by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and interpret data from various threat sources to preempt potential cyber attacks. Security Automation & Scripting - Familiarity with scripting languages (such More ❯
Quincy, Massachusetts, United States Hybrid / WFH Options
Hire Elevation Resources
of system roles and user interfaces. Continuously improve audit and security procedures and maintain up-to-date documentation. Respond to security incidents and conduct forensicanalysis when needed. Oversee and maintain vulnerability scanning tools, scheduling scans, and coordinating remediation. Generate and maintain routine and ad hoc reports. Provide More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
architecture and operation of IT systems. Collaborate with incident response teams to investigate security breaches, malware infections, and other cyber incidents. Conduct digital forensics analysis to determine the root cause of incidents and recommend remediation measures to prevent recurrence. Develop and maintain cybersecurity policies, standards, and procedures based on More ❯
gaming, tabletop exercises, and proactive threat mitigation to keep the organisation battle-ready. Key Responsibilities: Investigate and respond to cyber incidents, digging deep into forensicanalysis to uncover root causes and stop advanced threats. Build, refine, and maintain the tools and processes that power the forensic and More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensicanalysis to determine the root cause and recommend remediation actions. Outside of this, you will be an enthusiastic individual with a passion for More ❯
suspicious activity. Analyse and investigate security incidents to determine their impact and root cause. Respond to security incidents, including containment, eradication, and recovery. Perform forensic analysis. Develop trusting relationships with critical third-party security providers. Prepare reports on security incidents and recommend improvements. Develop threat intelligence relevant to the … business. Conduct threat hunting, vulnerability analysis, and penetration testing to identify risks. Continually assess security systems, suggesting appropriate tools and countermeasures. Prepare and maintain security and incident response documentation. Collaborate with management, IT, and other departments to implement security improvements. Participate in security audits and assessments. Stay updated with More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Aerospace Corporation
a special collection of problem solvers, thought leaders, and innovators. Join us and take your place in space. The Defense Systems Group (DSG) provides analysis-based decision support to senior leaders on space architectures, policy and strategy, developmental planning, system of systems engineering, and threat reduction to help shape … team this individual is responsible for managing, maintaining, and troubleshooting Aerospace's resources on a classified government network to ensure optimal performance and timely analysis by engineers. Work Model Due to the classified nature of this position and vital on-site actions, this position is not open to tele …/ESx/Xen Hypervisors, Microsoft Windows Server and Windows Server 2012r2/2016, Enterprise networking/firewalls/intrusion detection/prevention systems, forensicanalysis/vulnerability assessment Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Win 10, Toolkits More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Gold Group Limited
suspicious activity. Analyse and investigate security incidents to determine their impact and root cause. Respond to security incidents, including containment, eradication, and recovery. Perform forensic analysis. Develop trusting relationships with critical third-party security providers. Prepare reports on security incidents and recommend improvements. Develop threat intelligence relevant to the … business. Conduct threat hunting, vulnerability analysis, and penetration testing to identify risks. Continually assess security systems, suggesting appropriate tools and countermeasures. Prepare and maintain security and incident response documentation. Collaborate with management, IT, and other departments to implement security improvements. Participate in security audits and assessments. Stay updated with More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
bet365
Who we are looking for A Software Developer, who will be responsible for developing the systems that support forensicanalysis and actively defend the Company’s systems. The Software Product Development department supports and develops systems designed to process high volumes of data transactions and execute in real More ❯
Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
Who we are looking for A Software Developer, who will be responsible for developing the systems that support forensicanalysis and actively defend the Company’s systems. The Software Product Development department supports and develops systems designed to process high volumes of data transactions and execute in real More ❯
with various logging, monitoring and alerting platforms and have expertise in the usage (and, desirably, the deployment) of e.g. ELK, CloudWatch, Fluentd, to enable forensic log analysis and system tuning as well as data-driven performance analysis (i.e. SLI/SLO) and capacity planning. You are a More ❯
with various logging, monitoring and alerting platforms and have expertise in the usage (and, desirably, the deployment) of e.g. ELK, CloudWatch, Fluentd, to enable forensic log analysis and system tuning as well as data-driven performance analysis (i.e. SLI/SLO) and capacity planning. You are a More ❯