server administrators, manage domain accounts, network rights, and access to systems and equipment for Maintain, patch, and update software and hardware used in the digitalforensics laboratory to ensure compatibility and effectiveness. Install, troubleshoot, configure, and maintain on-premises network infrastructure, workstations, servers, system hardware, software, and peripheral More ❯
summaries and in-depth technical reports • Planning, coordinating and directing the inventory, examination and comprehensive technical analysis of computer related evidence • Serving as technical forensics liaison to stakeholders and explaining investigation details • Required Skills: • U.S. Citizenship • Must have an active Secret clearance (TS/SCI eligible) and be able … analyze anomalies in network traffic using metadata • Ability to create forensically sound duplicates of evidence (forensic images) • Able to write cyber investigative reports documenting forensics findings • In depth knowledge and experience of: • identifying different classes and characterization of attacks and attack stages • CND policies, procedures and regulations • proactive analysis … Education: 8+ years of experience and BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digitalforensics or network forensic experience Desired Certifications: - GCFA, GCFE, EnCE, CCE, CFCE, CEH, CCNA, CCSP, CCIE, OSCP, GNFA More ❯
is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving Grounds, Maryland. This role provides advanced penetration testing skills, basic forensics, and reverse engineering capabilities. The candidate will be performing advanced analysis of target systems to generate an understanding of their function and potential paths … and CNSS Experience performing vulnerability assessments Experience with using Linux for exploitation Experience with command-line interfaces Experience with Mobile devices debugging Experience with digitalforensics techniques Experience with tools such as Aircrack, Ghidra, Nmap, Burpsuite, Metasploit, SQLMap, PostMan, etc. These qualifications would be nice to have: Experience More ❯
hire Desired Skills (knowledge or experience within one or more of the following areas): Relative academic degree or technical certification within Cyber Hunting or DigitalForensics Incident Response (System or Network Threat Triaging) Penetration Testing SAIC accepts applications on an ongoing basis and there is no deadline. Covid More ❯
in finding highly qualified staff in the following areas: Forensic Accounting & Fraud - (AML/CTF, Investigation, CFE’s etc.); Legal and LegalTech (E-Discovery, DigitalForensics, EDRM); Big Data and Data Analytics- (MI/BI/CI); InfoSec and Cyber Crime; Audit; Accountancy and Finance; FinTech (Payments etc. More ❯
to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures. Qualifications: Required: Demonstrated experience in digitalforensics and hands-on forensic reviews. Proficiency in the use of forensic tools such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight. More ❯
PM team to collectively manage requests as they arise in real-time. In addition, you will be communicating directly with several other internal departments (DigitalForensics, Data Processing, Hosting Support, etc.). Being able to creatively resolve conflicts is a very important aspect of this position. Task Management More ❯
PM team to collectively manage requests as they arise in real-time. In addition, you will be communicating directly with several other internal departments (DigitalForensics, Data Processing, Hosting Support, etc.). Being able to creatively resolve conflicts is a very important aspect of this position. Task Management More ❯
in finding highly qualified staff in the following areas: Forensic Accounting & Fraud - (AML/CTF, Investigation, CFE's etc.); Legal and LegalTech (E-Discovery, DigitalForensics, EDRM); Big Data and Data Analytics- (MI/BI/CI); InfoSec and Cyber Crime; Audit; Accountancy and Finance; FinTech (Payments etc. More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Boeing
computer science, data science, mathematics, physics, or chemistry 9+ years of experience in Cybersecurity or Product Security 3+ years of experience penetration testing or digitalforensics 2+ years of experience reverse engineering and mapping binaries 3+ years of experience utilizing disassembly software to identify vulnerabilities (e.g. Ghidra, IDA More ❯
by some of the smartest minds in the industry. What you ll do: Ensure the triage, investigation, and remediation/mitigation of incidents using digital forensic tools and cybersecurity methodologies. Provide support for OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents More ❯
by some of the smartest minds in the industry. What you’ll do: Ensure the triage, investigation, and remediation/mitigation of incidents using digital forensic tools and cybersecurity methodologies. Provide support for OT security monitoring, alerting, and investigations. Collaborate with diverse stakeholders and functions to address cybersecurity incidents More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Noblis
wireless communications, and general TSCM procedures and processes. General knowledge of counterintelligence investigations, insider threat operations, physical security and anti-terrorism requirements, cyber security, digital forensic, and IT infrastructure. US Citizenship is required. Senior Level Bachelors degree with 8 to 12 years of prior relevant experience or Masters with More ❯
provide written technical reports related to the scope, nature, and characteristics of the malicious code. 4+ years of experience in malware analysis, reverse engineering, digitalforensics or related position Experience with Python Experience with Intel x86/x64 assembly Experience with Windows operating system & architecture Experience with static … Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques Knowledge of the MITRE ATT&CK framework Knowledge of common digital forensic techniques and practices Experience with additional architectures such as ARM/ARM32 and MIPS Experience with other operating system file formats, such as More ❯
architecture, engineering, implementation, and operation of infrastructure components, including network, storage, and computer systems. The ideal candidate will have extensive experience in network engineering, digitalforensics, and the ability to support both network systems and forensic application development. Responsibilities: Network Engineering Support: o Assist with the continuous monitoring … impact in a fast-paced, mission-critical environment. If you have the required technical expertise and are passionate about supporting advanced network engineering and digital forensic operations, we encourage you to apply. More ❯
West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
shape the future of their cybersecurity operations from the very beginning. We're looking for candidates with experience in: Cyber Defence SecOps Incident Response DigitalForensics Threat Management Operational Technology CNI Staying up to date with new and emerging threats Details: Location : West Midlands – Hybrid Salary : Up to More ❯
and support cybersecurity initiatives across multiple teams and locations. Conduct assessments and investigations aligned with cyber risk reduction goals. Qualifications Experience in cybersecurity operations, digitalforensics, or large-scale data analysis. Strong understanding of internet protocols, network infrastructure, and system security. Proficient in both Windows and Linux environments. More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯
in cybersecurity will take center stage in safeguarding vital information and ensuring the security of our nation. Become a key player in fortifying our digital assets and upholding the confidentiality of sensitive information. In this role, you will be at the forefront of detecting and preventing cyber threats, implementing … unparalleled technological prowess. Requirements: Attend a 55-week paid training program to gain skills and certifications in computer systems, network security, network traffic analysis, digitalforensics, network security devices, communication network operations, and cyber operations. Advanced certifications require additional full funded training programs. Benefits: Comprehensive Healthcare, Vision, and More ❯