- UpvoteDownvoteShare Job
- Suggest Revision
Our research portfolio is thriving, with faculty actively engaged in research in a diverse range of fields such as bioengineering, communications and networking, computer engineering, controls and robotics, cyber-physical systems, cyber security, digital forensics, nanoelectronics, power systems, signal processing, and space-based systems.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SIEM, Network Behavior Analysis tools, Antivirus, and Network Packet Analyzers, Digital Forensics tools in an Enterprise environment, Cyber Incident Response activities in an Enterprise environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the common open source and commercial tools used in security event analysis, incident response, computer forensics, malware analysis, or other areas of security operations.
$66,000 - $106,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
An Associate of Science (A.S.) or Bachelor of Science (B.S.) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
$113,485 - $170,227 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Log Analysis, Packet Analysis OSI Model, Network Architectures, NIST, DICAP, RMF, and Information Operations, threat intelligence activities including the collection of and tracking threat actors, digital forensics incident response; and threat hunting methodologies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform incident response functions including host-based analytical functions (including digital forensics, metadata, and malware analysis) through investigating Windows, Unix based appliances, and macOS X systems to uncover Indicators of Compromise (IOCs) and/or Tactics, Techniques and Procedures (TTPs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Information Security, Computer Science, Digital Forensics, Cyber Security or related field or equivalent military experience required. 6+ years of incident response or digital forensics consulting experience with a passion for cyber security.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our team is composed of recognized experts and incident responders with deep technical expertise and experience in investigations, data breach response, digital forensics, and information security.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
An Associate of Science (A.S.) or Bachelor of Science (B.S.) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) In lieu of a degree, at least two (2) years of network-related experience is required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage incident response engagements to scope work, guide clients through forensic investigations, contain security incidents, and provide guidance on longer term remediation recommendations. Our vision is to create a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services to clients of all sizes.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
With a highly successful track record of delivering mission-critical cybersecurity solutions, we are experienced in working quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients' security posture.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, relevant experience may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, cybersecurity, systems engineering and/or network and system administration.
ExpandApply NowActive JobUpdated Today
digital forensics computer security jobs in Hollis, New Hampshire
FEATURED BLOG POSTS
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
How to Get a Union Job? A Step-by-Step Guide
A union job can significantly impact your job security, pay, and employment benefits. Whether this is your first job or you have years of experience, a union job can offer much-needed protection in a labor market where employees are hired and fired at will.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.