Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Laboratory Aide

Candidate must possess High School graduate, Vocational or College level. ·Experience as Utility/ Messenger is an advantage. Knowledge in basic office dut...


Berkman Systems, Inc. - National Capital Region

Published a month ago

Data Science

Data Science Practitioner Project Role Description: Manage, architect and analyze big data in order to build data driven insights and high impact data mode...


Neksjob Corporation - National Capital Region

Published a month ago

Contract Specialist

Job Description Job Summary Supports the contract lifecycle of identified IT requirements, which include activities such as, but not limited to request for ...


Hunters Hub Inc - National Capital Region

Published a month ago

Lab. Analyst / Chemist

LAB. ANALYST / Chemist Candidate must possess a Professional License in Chemistry or Chemical Technician.At least 1-2 years of working experience in the rel...


Elarsi, Inc. - National Capital Region

Published a month ago

Forensic Investigation Senior Analyst

Details of the offer

Key Responsibilities:

Execute documented processes within all activities of the CIRT playbook and security incident response lifecycle.
Collect, preserve and process volatile information and evidences needed to conduct highly-confidential forensic investigations. Investigation of digital evidences may include:
Storage media (i.e. hard drives, optical and flash media)
Electronic data (i.e. electronic files, pictures, web data, technology device logs)
Mobile devices (i.e. mobile phones, tablets)
Volatile media (i.e. workstation memory)
Preserve the admissibility of collected evidences and Chain of Custody, in accordance with team and industry best practices. Ensure forensic evidences, and corresponding documentation, are identified, recorded, secured and accurately tracked.
Investigate low to medium complexity incidents cases assigned such as, but not limited to:
Acceptable Use Policy / Code of Business Ethics Violation
Malware
Fraud, Intellectual Property Theft, Industrial Espionage
Cyber Attack / Hacking / APT / Security Breaches
Investigation of digital evidences may include:
Storage media (i.e. hard drives, optical and flash media)
Electronic data (i.e. electronic files, pictures, web data, technology device logs)
Follow forensic investigation and incident response procedures, processes, policies, guidelines.
Examine and analyze security events or incidents, and investigate low to medium complexity issues, related to technology infrastructure. Employ technical, investigative and analytical skills to solve assigned issues or problems.
Carry out or coordinate containment and remediation steps, until security incident closure, as advised by Incident Response Specialist or Manager.
Produce detailed written reports outlining the circumstances around the incident, present forensic evidences and communicate investigation results and relevant findings to a non-technical audience
Complete varied low to medium complexity and non-standard tasks in an assigned area of responsibility.


Qualifications:

Bachelor's degree in Computer Forensic or Digital Forensic or Cyber Security
Industry certification in multiple operating systems and/or network
2-3 years relevant experience if graduate of other Computer related course
Fresh graduates can be considered as long as they're a graduate of Computer Forensic or Digital Forensic or Cyber Security
Strong hardware/ software/ OS experience
Thinks out of the box and goes beyond the guidelines/playbook in order to resolve an issue/escalation

Good to Have:
One or more computer forensics and information security certifications is a plus :

Guidance Software Encase Certified Examiner (EnCE)
EC Council Computer Hacking Forensic Investigator (CHFI)
EC Council Certified Ethical Hacker (CEH)
SANS GIAC Certified Incident Handler (GCIH)
SANS GIAC Certified Forensic Examiner (GCFA)
ISC2 Certified Information Systems Security Professional (CISSP)
ISACA Certified Information Systems Auditor (CISA)
ISACA Certified Information Systems Manager (CISM)
Comptia Security +

Reverse malware, advanced security operations, advanced tech support
Digital forensic investigator
3 years vulnerability assessment and penetration testing


Nominal Salary: To be agreed

Source: Whatjobs_Ppc

Job Function:

Requirements

Built at: 2024-12-26T10:33:29.493Z