- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications in digital forensics or cybersecurity (e.g., GCFE, GCFA, CCFP, or CEH). 2-5 years of experience in a digital forensics, incident response, threat hunting, or cybersecurity role.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in either network/host-based intrusion analysis, digital forensics or cyber threat intelligence. CISA, CISSP, CEH, SANS GIAC, MCSE, CCNA or SSCP (1 or more preferred) The Incident Response & Forensic Analyst provides support to the Department of Health and Human Services, Indian Health Service (IHS.
ExpandUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Director will oversee a variety of services such as Tier 1, 2, and 3 Incident Response, Digital Forensics, Data Loss Prevention (DLP) Operations, and Litigation Support. Leadership and Strategy Development: Provide leadership and strategic direction for Incident Response, Digital Forensics, DLP Operations, and Litigation Support teams.
RemoteExpandUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Contract personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. - Ability to author cyber investigative reports documenting digital forensics findings.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
2 or more years of hands-on technical work experience in eDiscovery, digital forensics, and/or document review technologies. One or more certifications related to eDiscovery or digital forensics (e.g., EnCE, GCFE, GASF, CEDS, and others.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SIEM, Network Behavior Analysis tools, Antivirus, and Network Packet Analyzers, Digital Forensics tools in an Enterprise environment, Cyber Incident Response activities in an Enterprise environment.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GCIH, Security+, CySA+, AWS CCP, or Microsoft Certified Azure Fundamentals Certification. Experience in performing forensic analysis, malware analysis, threat hunting, and threat intelligence. Perform incident triage and investigation, using threat intelligence, forensic analysis, malware analysis, and other methods.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
An Associate of Science (A.S.); Bachelor of Science (B.S.); Master of Science (M.S.); or Doctorate (PhD) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in digital forensics, cybersecurity, computer science, information systems or similar field. Coalition combines comprehensive cyber insurance coverage and security services to help businesses prevent digital risk before it strikes.
ExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SpiderLabs is Trustwaves elite security team focused on digital forensics, incident response, penetration testing, application security and threat intelligence. Have several years experience in digital forensics and/or incident response.
ExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with reverse engineering, digital forensics (DFIR) or incident response, or machine learning models. Microsoft Corporation Senior Security Analyst Atlanta , Georgia Apply Now Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security technologies including Zscaler, Palo Alto, Broadcom DLP, Microsoft, Check Point, CrowdStrike, Splunk, CyberArk, Checkmarx, Contrast, Veracode, etc. Broad cybersecurity experience in the areas of Application Security, Vulnerability Management , Network Security, Security Analytics, Cloud Security, IAM, DFIR, Email Security, DLP, etc.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This role is part of our Cybersecurity – Digital Identity (DI) team which assist our clients in aligning security management strategy with business goals by managing who has access to which resources and services, as well as enforcing business, privacy, and security policies.
$37,700 - $77,100 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working in a fast-paced environment with Digital Forensics and Incident Responders. Identify cyber threats, trends, and new malware families and threat actor groups by analyzing Arete’s case reports, MDR & SOC escalations, sandbox submissions, raw and open-source intelligence.
ExpandUpdated 18 days ago
digital forensics jobs
FEATURED BLOG POSTS
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!