- Jacobs (Fort Meade, MD)
- …recover lost files. * Provide testing and evaluation of emerging trends in digital forensics software and hardware and assist in developing new and innovative ... events, and malware analysis * Research, design, deploy, and lead training events. * Evaluate emerging forensic technologies. *...the past 2 years. * Minimum 2 years of mobile device forensics experience. * Minimum 2… more
- MTA (New York, NY)
- …off the shelf security software , with the ability to support this software on servers, desktops, laptops, and mobile devices. + Proven knowledge of ... documentation. + Install, configure and troubleshoot complex hardware and/or software solutions supporting critical business functions and customer facing services.… more
- United Airlines (Chicago, IL)
- …Content filtering technologies + Application firewalls + Vulnerability scanners + LDAP + Forensics software + Security incident response + Federation Services + ... and architecture projects that could be incorporated into business solutions + Lead security investigations and provide forensics services in responds to… more
- JPMorgan Chase (Columbus, OH)
- …safe, stable and resilient. As the Cybersecurity Assurance Cyber Risk Pillar Lead the primary responsibility is to support the cybersecurity domain construct for ... of the firm including such disciplines as SIEM, DLP, Digital Forensics , Network Telemetry and File Analysis, Cyber Intel, Vulnerability Management, Attack… more
- Palo Alto Networks (Santa Clara, CA)
- …including OWASP & MITRE ATT&CK + Ability to read and use the results of mobile code, malicious code, and anti-virus software + Ability to scope new opportunities ... to shaping the future of cybersecurity as we are. **Our Approach to Work** We lead with flexibility and choice in all of our people programs. We have disrupted the… more
- Meta (Washington, DC)
- …intellectual property, and leaks of sensitive information. We collaborate with software engineering teams to build advanced detection capabilities and understand how ... for people that have a strong technical background, experience with computer forensics , data analytics, system and network administration, and the ability to build… more
- AIG (Charlotte, NC)
- …as a subject matter expert (SME) in the fields of digital forensics , insider threat, and cyber investigations. Position Responsibilities: + Perform highly sensitive ... intellectual property theft, embezzlement, misuse, harassment, and physical security threats. + Lead proactive efforts to identify, disrupt, and protect AIG from any… more
- RESOURCE MANAGEMENT CONCEPTS, INC (Indian Head, MD)
- …part of an integrated team including system administrators, network engineers, software developers, service desk analysts, and other personnel on site. ... including but not limited to computers, printers, phones (desk and mobile ), and audio-visual equipment * Perform server/workstation installations and technology… more
- Meta (Washington, DC)
- …modeling, TTP identification, and detection engineering. You'll work alongside Software Engineers and Offensive Security Engineers to identify critical assets, ... Security Engineer - Surface Coverage, Detection Engineering Responsibilities: 1. Lead cross-functional projects to improve our capabilities to effectively detect… more
- Microsoft Corporation (Redmond, WA)
- …executive visibility on extremely short timelines. These responsibilities include: + Lead and coordinate the response and recovery activities from information ... **Qualifications** **Required/Minimum Qualifications:** + 5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly… more
- Spectrum (Greenwood Village, CO)
- …and vulnerabilities to the company's telecommunications and signal processing hardware, software and electrical systems. Works closely with network engineering and ... and alerts to ensure applications and security architecture is healthy. Identify and lead the response and mitigation activities for the system events. + Implements,… more
- Black Hills Energy (Rapid City, SD)
- …of emerging technologies in IT such as a Cloud Platform, Internet of Things and Mobile BYOD as well as the associated security risks. + Working knowledge of common ... Essentials; Ethical hacking; Auditing and monitoring networks, systems, and users; forensics and malware analysis; security incident response. + Knowledge of… more