deployed across remote platforms. Contribute to and improve data pipelines, ensuring reliable and efficient system updates. Build and enhance features for real-time data analysis and system monitoring to ensure high uptime and efficiency. Collaborate with data scientists and engineers to support advanced analytics and machine learning workflows. Support … of our codebase toward machine learning capabilities by building scalable, maintainable solutions. Analyze system logs and performance to debug issues and optimize operations using forensicanalysis tools. Qualifications: Bachelor's or Master's degree in Computer Science, Mathematics, Data Analytics, or a related field. 3+ years of experience … BI, Apache Spark/Databricks, and PySpark. Hands-on experience with data warehousing methodologies and optimization libraries (e.g., OR-Tools). Experience with log analysis, forensic debugging, and system performance tuning. Exposure to cloud-based systems. Familiarity with Agile/SCRUM methodologies in collaborative development workflows. Proficient English More ❯
or security incidents/Investigate and respond to security events, vulnerabilities and threats in a timely and efficient manner/Support incident response and forensicanalysis, including playbook documentation and root cause analysis/Assist in managing identity and access controls, including reviews of user entitlements and More ❯
security access. Planning for disaster recovery in case of security breaches. Monitoring for attacks, intrusions, and unusual or unauthorized activities. Performing log reviews and forensicanalysis to identify unauthorized data or system access. Conducting security assessments, risk analysis, and root cause analysis of security incidents. Handling More ❯
time. Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. Maintain and optimize security information and event management systems and other security tools used in the SOC. More ❯
time. Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. Maintain and optimize security information and event management systems and other security tools used in the SOC. More ❯
time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security tools used in the SOC. More ❯
application security. Experience building and running company-wide security programs. Proven ability to handle real and simulated cybersecurity incidents. Familiarity with security operations and forensicanalysis tools. Excellent communication skills, with experience presenting to executive leadership. More ❯
are looking for a Subject Matter Expert in cryptocurrency who seeks an exciting, long-term career opportunity at one of the most highly-respected forensic accounting, investigations, and compliance consultancies in the world. This individual has a genuine interest in all things cryptocurrency, including blockchain forensicanalysis … cryptocurrency, blockchain technology, and cryptocurrency asset transaction tracing and analytics. They also have an understanding of fraud and money laundering typologies and experience conducting forensic investigations. This position requires a skillset in the identification of cryptocurrency financial crime risks and threats, and the ability to work in FRA's … and thought leadership in Cryptocurrency Investigations and Compliance practice. Ability and willingness to travel both domestically and internationally, if required. Experience working with data analysis platforms (Tableau, PowerBI, SQL, or Python preferred) and large datasets. About Us FRA is a market leader in regulatory compliance, financial investigations, and data More ❯
departments to create and improve processes that can easily adapt to the constantly evolving nature of music licensing. You will be responsible for the forensicanalysis of income received against income expectations across all major revenue streams and instigate back claims, adjustments and supplemental payments where required. You … of reports that support Income Tracking, including exception & variance reporting, as required for the local offices. Here you'll get to: Conduct income tracking analysis for major revenue sources and support ad hoc requests from local offices. Work as an integrated member of a future-facing administration team. Evolve … ways of working to take our income tracking to the next level. Identify and make claims for shortfalls in income based on analysis of incoming statements. Provide Adhoc analysis for the business on income received from societies, DSPs, affiliates and third parties. Monitor accurate deal level expectations across More ❯
Associate/Senior Associate, Investigations - Cryptocurrency My client is seeking a Cryptocurrency Subject Matter Expert to join one of the world's leading forensic accounting, investigations, and compliance consultancies. This is an exciting, long-term career opportunity for individuals passionate about cryptocurrency, blockchain forensicanalysis, investigations, and … compliance, including AML and sanctions. The ideal candidate has a deep understanding of cryptocurrency, blockchain technology, and transaction analytics, along with experience in forensic investigations, fraud detection, and financial crime risk assessment. This role will be part of my clients Cryptocurrency Investigations and Compliance team, supporting the firm's … of financial regulations (FinCEN, FFIEC, AML guidelines). Strong analytical, investigative, and organizational skills. Advanced proficiency in Excel and Office Suite. Experience with data analysis tools (Tableau, Power BI, SQL, Python preferred). Proven ability to manage multiple projects and client relationships. Excellent written and verbal communication skills. Willingness More ❯
detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penertration testing. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penertration testing. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
SDN/SDA environments and virtualised infrastructure (e.g., VMware, Hyper-V, UCS, QNAP) Awareness of the security incident lifecycle, including threat detection, response, and forensicanalysis If this position is of interest, please send an updated CV through and I will call you to discuss in more detail. More ❯
detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
with various logging, monitoring and alerting platforms and have expertise in the usage (and, desirably, the deployment) of e.g. ELK, CloudWatch, Fluentd, to enable forensic log analysis and system tuning as well as data-driven performance analysis (i.e. SLI/SLO) and capacity planning. You are a More ❯