- UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and malware analysis.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Exposure to security related subjects and trends such as digital forensics, reverse engineering, penetration testing, and malware analysis. Provide tactical security decisions and coordinate enterprise-wide cyber defenders to resolve incidents.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Information Security, Computer Science, Digital Forensics, Cyber Security or related field or equivalent military experience required. Founded in 2013 by security and risk experts Dr. Alex Yampolskiy and Sam Kassoumeh and funded by world-class investors, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their digital footprint.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing digital forensics and analysis on a variety of vendor/OEM equipment—including but not limited to laptop/desktops, PLC's, HMI's, Historians, and related SCADA systems.
$115,000 - $125,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security monitoring platforms and underlying technologies including Security Information and Event Management (SIEM) or vulnerability assessment frameworks, intrusion detection and host discovery techniques, usage of Intrusion Detection and Prevention Systems (IDS/IPS), host-based and network-based firewalls, host-based and network-based forensics frameworks, and utilization of penetration testing techniques and tools to activity secure organizational assets.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience with information security, including penetration testing, intrusion detection, incident response, threat analysis, or digital forensics. Research and recommend solutions for incident response and digital forensics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This job may involve working in areas such as Investigations, Information Governance and Electronic Discovery (eDiscovery) related to the collection of computer and digital data, digital forensics, cyber investigations, data management, privacy and security, document review consulting, and engagement project management as part of a rotational program that provides exposure to all parts of the business.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies. Wells Fargo is seeking a Lead Cyber Security Research Consultant will perform tactical cyber-attack evaluation, exploit testing and analysis, cyber intelligence, and red or purple teaming.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience integrating and managing agile principles into cybersecurity, network, application monitoring , cyber threat intelligence, threat hunting, penetration testing and forensics. Certifications: GIAC Certified Incident Handler (GCIH), CISSP, CompTIA Advanced Security Practitioner + (CASP+), CompTIA Cybersecurity Analyst (CySA+), PMP, CSM, PMI-ACP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate contracted relationships with external security service providers for a variety of needs including digital forensics investigations, e-Discovery, or other sensitive data analysis as requested by IT management, Legal Counsel, Human Resources, or appropriate University officials.
$250Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct network terrain audits, penetration testing, basic digital forensics and software threat analysis. These certifications include: CompTIA A+ CompTIA Network+ CompTIA Security+ Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP) CISCO Certified Networking Associate (CCNA) About U.S. Army: Army Recruiting Ohio is a small portion of a larger whole.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information system security, cyber security, computer forensics, vulnerability assessment and penetration testing, malware analysis, insider threat. Architecting, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications.
$120,000 - $130,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking an experienced Cyber Analyst to join our team covering both forensics and malware analysis on a highly-visible cyber security single-award IDIQ vehicle that provides network operations security center (NOSC) support, including monitoring and analysis, cyber threat intelligence, email analysis, forensics, incident response, and malware analysis.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Threat Intelligence, Incident Response, Digital Forensics, Vulnerability Management and/or Malware Analysis. Bachelor’s degree in information assurance, Information Security, Strategic Studies, Cyber Intelligence, or similar discipline.
RemoteExpandApply NowActive JobUpdated Today
cyber security digital forensics jobs Title: associate Company: Capital One in Wailuku, Hawaii
FEATURED BLOG POSTS
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.