monitoring and analysis. Familiarity with security technologies and an understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of Threat Intelligence , DigitalForensics , and Data Loss Prevention . Relevant certifications such as CISSP , CEH , or Splunk certifications are highly desirable. Ability to thrive in a More ❯
Monitoring Plan and processes to minimize false positives, false negatives, and increase overall efficiency • Identify, characterize and provide solutions for information system threats • Perform digitalforensics and attack attribution, protection of critical networks, active systems warnings and indicators, detect active penetration into target systems, knowledge discovery of passive More ❯
Monitoring Plan and processes to minimize false positives, false negatives, and increase overall efficiency • Identify, characterize and provide solutions for information system threats • Perform digitalforensics and attack attribution, protection of critical networks, active systems warnings and indicators, detect active penetration into target systems, knowledge discovery of passive More ❯
experience in designing and implementing automation to improve security detection and response capabilities. Proficiency in scripting or programming languages is highly desirable Expertise in digitalforensics and preserving evidence integrity, with a strong understanding of cybersecurity laws, regulations, and ethics A team-oriented approach with excellent relationship-building More ❯
Leicestershire, England, United Kingdom Hybrid / WFH Options
Mattioli Woods
services ✔ Strong understanding of IT security concepts, cloud security, and identity-centric models ✔ Experience with security standards, governance frameworks, and vulnerability management ✔ Background in digitalforensics, cyber incident response, and threat monitoring 💡 Skills: ✔ Ability to lead and mentor a team of security professionals ✔ Strong analytical skills to assess … cyber threats while improving security posture ✅ Managing security tools, policies, and risk mitigation strategies ✅ Ensuring compliance with industry regulations and establish governance frameworks ✅ Conducting digital forensic investigations and managing security incidents ✅ Providing security awareness training across the business ✅ Collaborating with IT teams to enhance security infrastructure and processes ✅Lead … organisation-wide projects as part of a Digital Transformation and support wider business goals ✅Scope, run and close out internal and external audits/pen tests ✅Develop existing team members through hands-on mentoring Why join us? At Mattioli Woods, we are committed to innovation and excellence in financial More ❯
Assisting in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report - Documenting original condition of digital and/or associated evidence by taking photographs and collecting hash information - Assisting team members in imaging digital media - Assisting in gathering, accessing … insight into the cause and effect of suspected cyber intrusions - Following proper evidence handling procedures and chain of custody protocols - Producing written reports documenting digital forensic findings - Determining programs that have been executed, finding files that have been changed on disk and in memory - Using timestamps and logs (host … edge technologies and industry standard forensic tools - Ability to create forensically sound duplicates of evidence (forensic images) - Able to write cyber investigative reports documenting digitalforensics findings - Experience with the analysis and characterization of cyber attacks - Experience with proper evidence handing procedures and chain of custody protocols - Skilled More ❯
Monday to Fridays. The course starts on 4th Dec, 18th Dec 2023. You will learn: L2 TLM Accredited Certificate in Cyber Security and DigitalForensics - Learn the core principles of cybersecurity, networking, online threats and deploying security tools to defend an online system. L2 in Cyber Security - Learn … your skills and stay up-to-date with the latest cyber security trends and best practices. Summary: If you are looking to enter the digital industry but do not have the experience, skills or qualifications, but are a) analytical with a good attention to detail, b) willing to work … hard to pursue a new career in the digital sector, and c) are a quick learner, then you could be just the person they are looking for. No Experience Required You should: Be naturally competent in numeracy and mathematics. Be committed to pursuing a career in a digitalMore ❯
onsite incident response, and immediate investigation, using host-based, network-based and cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digitalforensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking Cyber Network Defense Analysts (CNDA) to support this … critical customer mission. JOB DESCRIPTION: Network-Based Cyber Forensics Analyst (NBA) • Assists the Government lead in coordinating teams in preliminary incident response investigations • Assists the Government lead with interfacing with the customer while on site • Determines appropriate courses of actions in response to identified and analyses anomalous network activity More ❯
They provide guidance, oversight and report to the Cell Major for assigned client engagements. They work directly with internal cross-functional teams, engineering staff, digitalforensics partners, external breach counsels, and external stakeholders to solve time-sensitive networking and computing infrastructure to restore the client's environment. Lieutenants … but need assistance with advanced troubleshooting. Build hosts and vCenter servers from scratch. Perform most tasks related to virtual guests. Firewall - Export logs for forensics from most firewall vendors. Configure and restrict traffic across S2S tunnels and VPNs. Configure VPN including AD Authentication and MFA integration. Backups - Rebuild and More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
security-related areas Experience with open source and threat intelligence platforms, including Mandiant, CrowdStrike, VirusTotal, Shodan, and Domain tools Experience with using industry-standard digitalforensics tools and procedures Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools More ❯
scheme Cycle to work scheme Retail discounts Continuous Professional development support Annual Wellness Allowance MASS is an Electronic Warfare Operational support (EWOS), cyber security, digitalforensics and support to military operations business. We deliver tailored, integrated solutions that are critical to customers' ability to deliver effective operations. An More ❯
Proven history of leading complex investigations, conducting employee interviews as necessary Experience building and managing data classification and control programs Hands on experience with digitalforensics and incident response Experience communicating technical security concerns and issues to a non-technical audience. Experience investigating and remediating unintended data exposure More ❯
onsite incident response, and immediate investigation, using host-based, network-based and cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digitalforensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking an Information Security Manager III to support this More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
Qualifications Professional certifications such as CISSP, CISM, CEH, GIAC. Familiarity with ITIL Service Management processes (Change, Incident & Problem Management). Experience in eDiscovery and digital forensics. Knowledge of operational security controls and product stacks. What's In It For You? Competitive salary and excellent benefits from day one including More ❯
Information Needs (IN's) to understand operational, tactical or strategic mission requirements - Conduct computer/network security to provide advice to the Government - Use digitalforensics and conduct vulnerability discoveries Degree and minimum years of relevant work experience as follows: - BS + 2-11 years' experience or; - MS … Required: - Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). - Information Assurance Certification may be required. - All candidates must have a current TS/ More ❯
security-related areas Experience with open source and threat intelligence platforms, including Mandiant, CrowdStrike, VirusTotal, Shodan, and Domain tools Experience with using industry-standard digitalforensics tools and procedures Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
into the architecture and operation of IT systems. Collaborate with incident response teams to investigate security breaches, malware infections, and other cyber incidents. Conduct digitalforensics analysis to determine the root cause of incidents and recommend remediation measures to prevent recurrence. Develop and maintain cybersecurity policies, standards, and More ❯
approach to dealing with multiple projects to very strict deadlines About Brimstone Consulting: We specialise in finding highly qualified staff in E-Discovery and DigitalForensics, Payments, Fraud, Risk, Compliance/Corporate Governance, IT, Big Data and Data Analytics, InfoSec and Cyber Crime, Audit, Accountancy and Finance. Brimstone More ❯
systems (IDS/IPS), endpoint detection and response (EDR) tools, and firewalls. Strong understanding of network protocols, operating systems, and security architectures. Familiarity with digitalforensics tools and techniques. Preferred Qualifications: Experience working in a government or defense environment. Familiarity with DHS policies and procedures. Knowledge of broader More ❯
New Zealand, the UK and US, we are a leading force in cyber security, offering services from strategy, GRC, managed security services, cloud security, digitalforensics and cyber education. If you’re ready to work with teammates that get you, a leader that supports you and customers that More ❯
New Zealand, the UK and US, we are a leading force in cyber security, offering services from strategy, GRC, managed security services, cloud security, digitalforensics and cyber education. If you’re ready to work with teammates that get you, a leader that supports you and customers that More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Dark Wolf Solutions
not limited to: Designing, testing, and implementing secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digitalforensics, loss prevention, and eDiscovery actions. Conducting risk and vulnerability assessment at the network, system and application level. Conducting threat modeling exercises. Developing More ❯
on knowledge of dealing with major security incidents Ability to automate using automation platforms or programming skills is a must Malware analysis experience and digitalforensics experience is a plus Certification of Cyber Security, Forensic and Incident Response is a plus (CISSP, ECSA, GISP, GCIH, GCFE, GCFA) We More ❯
and mitigation strategies Familiarity with technical operations, computer network operations (CNO), mobile device security, technology deployments into high threat environments, secure communication practices, and digitalforensics Frequent domestic travel with limited international travel - up to 25% Ability and strong motivation to learn new tools, techniques, and methodologies Willingness More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
SOC Analyst you will be helping customers effectively respond to and manage cybers security incidents, ranging from compromise assessments, to live incident response and digital forensics. The successful candidate will demonstrate a technical background, ideally experience or education in working in a SecOps environment and to react to any More ❯