- Adapt Forward (Pearl City, HI)
- Cyber Security Analyst Ops Watch Incident Response Charleston, SC Minimum of a Secret Clearance Required with ability to obtain TS/SCI Position Description As a ... CND Incident Response Analyst you will identify, isolate,...CSSP requirements as needed. * Performs network and host-based digital forensics on Microsoft Windows based systems… more
- Cengage Group (Honolulu, HI)
- … - locate and examine evidence on devices and analyzing and reporting findings. + Incident Response and Network Forensics - Detect, Contain and Mitigate ... + CCFP (Certified Cyber Forensics Professional) + CCFE (Certified Computer Forensics Examiner) + CSIH (Computer Security Incident Handler) + CREA (Certified… more
- Meta (Honolulu, HI)
- …and business partners to gain visibility through logging and detection 6. Perform live response , digital forensics , and analysis of a wide variety of ... resolution **Minimum Qualifications:** Minimum Qualifications: 8. 3+ years experience in an incident response and/or detection engineering role 9. 3+ years… more
- Meta (Honolulu, HI)
- …as Logs and events processing, Incident Management, Digital Forensics , Offensive Security Testing, Detection and/or Response tooling development **Public ... and provide context scaling our ability to investigate 6. Support security incident response in a cross-functional environment and drive incident resolution… more
- Hawaiian Electric (Honolulu, HI)
- …development and management for privacy, e-discovery, security awareness training, digital forensics , patch management, vulnerability remediation, and other ... planning, IT disaster recovery planning, and the Company's Computer Security Incident Response Team (CSIRT). + Participates in Company emergency response … more
- Deloitte (Honolulu, HI)
- …with advanced techniques for responding to continually evolving cyber-attacks + Providing cyber forensics and incident response support + Support the ... risk + Providing end-to-end Cloud security solutions to enable secure digital transformation + Managing system and software vulnerabilities + Establishing methods… more