into cyber security incidents. * Conduct proactive threat hunting to detect and neutralize emerging threats. * Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. * Investigate security incidents, including malware infections, phishing attacks, and unauthorized access attempts. * Develop and enhance incident response playbooks, ensuring … alignment with evolving threats. * Analyze threat intelligence sources to identify new attack vectors and adversary tactics. * Provide forensicanalysis and malware reverse engineering to assess security incidents. * Collaborate with IT, Risk, and Compliance teams to ensure regulatory compliance and security best practices. * Produce timely reports on incident trends … of cyber-attack techniques, including phishing, malware, ransomware, lateral movement, and data exfiltration. * Strong hands-on experience with SIEM, EDR, IDS/IPS, and forensicanalysis tools. * Expertise in threat cyber security frameworks such as MITRE ATT&CK and Cyber Kill Chains. * Strong analytical and problem-solving skills More ❯
deployed across remote platforms. Contribute to and improve data pipelines, ensuring reliable and efficient system updates. Build and enhance features for real-time data analysis and system monitoring to ensure high uptime and efficiency. Collaborate with data scientists and engineers to support advanced analytics and machine learning workflows. Support … of our codebase toward machine learning capabilities by building scalable, maintainable solutions. Analyze system logs and performance to debug issues and optimize operations using forensicanalysis tools. Qualifications: Bachelor's or Master's degree in Computer Science, Mathematics, Data Analytics, or a related field. 3+ years of experience … BI, Apache Spark/Databricks, and PySpark. Hands-on experience with data warehousing methodologies and optimization libraries (e.g., OR-Tools). Experience with log analysis, forensic debugging, and system performance tuning. Exposure to cloud-based systems. Familiarity with Agile/SCRUM methodologies in collaborative development workflows. Proficient English More ❯
or security incidents/Investigate and respond to security events, vulnerabilities and threats in a timely and efficient manner/Support incident response and forensicanalysis, including playbook documentation and root cause analysis/Assist in managing identity and access controls, including reviews of user entitlements and More ❯
application security. Experience building and running company-wide security programs. Proven ability to handle real and simulated cybersecurity incidents. Familiarity with security operations and forensicanalysis tools. Excellent communication skills, with experience presenting to executive leadership. More ❯
are looking for a Subject Matter Expert in cryptocurrency who seeks an exciting, long-term career opportunity at one of the most highly-respected forensic accounting, investigations, and compliance consultancies in the world. This individual has a genuine interest in all things cryptocurrency, including blockchain forensicanalysis … cryptocurrency, blockchain technology, and cryptocurrency asset transaction tracing and analytics. They also have an understanding of fraud and money laundering typologies and experience conducting forensic investigations. This position requires a skillset in the identification of cryptocurrency financial crime risks and threats, and the ability to work in FRA's … and thought leadership in Cryptocurrency Investigations and Compliance practice. Ability and willingness to travel both domestically and internationally, if required. Experience working with data analysis platforms (Tableau, PowerBI, SQL, or Python preferred) and large datasets. About Us FRA is a market leader in regulatory compliance, financial investigations, and data More ❯
support to the Microsoft 365 (M365) ecosystem Advanced proficiency with Microsoft 365 services and their security configurations Hands-on experience with M365 including configuration, analysis and pivoting through large data sets and security best practices Experience with Identity and Access Management and M365 services - OneDrive, Teams, SharePoint, Exchange Online … etc. Proficient with Azure/M365 tenant capabilities and roles that support incident response/forensicanalysis Experience with various log aggregation/data analytics tools, such as Splunk, Sentinel, etc. Industry-accredited certifications will be required. Candidates with M365 security certifications (ex: M365 Security Operations Analyst/ More ❯
time. Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. Maintain and optimize security information and event management systems and other security tools used in the SOC. More ❯
time. Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. Maintain and optimize security information and event management systems and other security tools used in the SOC. More ❯
time. - Develop, implement, and fine-tune detection rules and correlation logic to improve threat detection capabilities. - Conduct in-depth investigations of security incidents, perform forensicanalysis, and coordinate incident response activities. - Maintain and optimize security information and event management systems and other security tools used in the SOC. More ❯
Associate/Senior Associate, Investigations - Cryptocurrency My client is seeking a Cryptocurrency Subject Matter Expert to join one of the world's leading forensic accounting, investigations, and compliance consultancies. This is an exciting, long-term career opportunity for individuals passionate about cryptocurrency, blockchain forensicanalysis, investigations, and … compliance, including AML and sanctions. The ideal candidate has a deep understanding of cryptocurrency, blockchain technology, and transaction analytics, along with experience in forensic investigations, fraud detection, and financial crime risk assessment. This role will be part of my clients Cryptocurrency Investigations and Compliance team, supporting the firm's … of financial regulations (FinCEN, FFIEC, AML guidelines). Strong analytical, investigative, and organizational skills. Advanced proficiency in Excel and Office Suite. Experience with data analysis tools (Tableau, Power BI, SQL, Python preferred). Proven ability to manage multiple projects and client relationships. Excellent written and verbal communication skills. Willingness More ❯
VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
VPNs, and intrusion detection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Investigate security incidents, conduct forensicanalysis, and apply swift mitigation actions. Stay current on security technologies and trends to enhance system protection. Design disaster recovery plans and coordinate More ❯
with various logging, monitoring and alerting platforms and have expertise in the usage (and, desirably, the deployment) of e.g. ELK, CloudWatch, Fluentd, to enable forensic log analysis and system tuning as well as data-driven performance analysis (i.e. SLI/SLO) and capacity planning. You are a More ❯
of significant parts of the data team's solution development. Onboard, document and curate external datasets for internal usage. Engage in data interpretation and forensic data analysis and troubleshooting. Produce high-quality, tested, maintainable, and readable code, and improve the existing codebase. Contribute to the peer review process More ❯