Average salary: Rs420,000 /yearly
More statsSearch Results: 18 vacancies
Rs 4.2 lakh p.a.
...Your Dream Job Awaits!! Come aboard US MNC and be part of an innovative team. Currently seeking a talented Senior Forensic Technician to work at Chennai. If you have 2-5 years of experience, do explore. Click on the link below and Apply today!
The Role
You will be responsible...
...skillset using PowerShell or automation tools like Ansible
Good to have hands-on familiarity with host-based security solutions, Forensic & Investigation agents,
and Compliance scanning and reporting.
Good Knowledge on M365 Services.
Good Knowledge of and experience...
...Relevant experience in cybersecurity architecture, engineering, and/or SOC work experience (monitoring, detection, incident response, forensics)
Monitoring for emerging threat patterns and vulnerabilities
Vulnerability Scheduling, monitoring & troubleshooting the tools...
...sufficient details about the normal activities of the system to allow a history of events to be reconstructed, making use of appropriate forensic techniques and technologies;
Triage on general information security tickets.
Undertake computer forensic investigations. Such...
...financial distress and preparing essential documentation for bankruptcy proceedings including dealing with issues relating to valuation and forensic audits. You will also have play a critical role in turnaround advisory. You will also play a crucial role in arbitration processes,...
...vulnerability management, OWASP model, CVE ratings
~ knowledge of networking protocols and equipment
~ with packet analysis and forensic tools
~ of a managed security service provider operating model.
~ IDS/IPS, Web Firewalls, Sandboxing, NAC and other security tools...
...best practices
Assess and prioritize security risks and provide recommendations for remediation
Conduct incident response and forensic analysis in the event of security breaches
Stay updated on the latest security threats vulnerabilities and best practices
Document...
...or unauthorised access attempts.
Investigate and respond to security incidents, including analysing security logs and conducting forensic investigations.
Develop and implement security policies, procedures, and standards to ensure compliance with regulatory requirements...
...the practice to be recognized as a leader in the field of cyber security
Demonstrated knowledge of information security, computer forensics and data analysis; practices & procedures related to the investigation and response to network/computer intrusions and data theft....
...various operating system Flavors, Applications, Databases, and Middleware to
address security threats against the same.
• Experience/knowledge in Digital Forensics.
• Professional/Technical Certifications (Security+, CCSE, CCSP, TICSA, MCSE, CISSP, etc.) desirable...
...and data recovery and management needs of our clients.
Serving clients for over 30 years, KLDiscovery offers data collection and forensic investigation, early case assessment, electronic discovery and data processing, application software and data hosting for web-based document...
...understanding of Cybersecurity prevention, detection, and response capabilities such as, but not limited to: AV, EDR, SIEM, digital forensics suites, IPS, and WAF
~ Experience in delivering technical solutions from concept, selection, installation, testing and implementation...
...offline in various colleges and institutions.
The ideal candidate will possess a strong background in Cybersecurity and Digital forensics, coupled with a passion for educating and mentoring individuals in these cutting-edge technologies.
As a Cybersecurity Trainer,...
...and data recovery and management needs of our clients.
Serving clients for over 30 years, KLDiscovery offers data collection and forensic investigation, early case assessment, electronic discovery and data processing, application software and data hosting for web-based document...
...Investigation and Analysis:
Conduct in-depth investigations into security incidents to identify root causes and potential vulnerabilities.
Forensic Data Collection:
Perform forensic data collection and analysis to support incident response efforts.
Communication and...
...threats.
~ Hands-on experience with incident response tools and technologies, such as SIEM, EDR, threat intelligence platforms, and forensic investigation tools.
~ Relevant certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems...
...Infrastructure
Threat and Vulnerability Management
Data Protection
Policy Program Management
End User
Monitoring, Response and Forensics
Desired skills *
CISA certified
Working knowledge of general bank policies, programs, and Agile methodology
Work...
...possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. The approach enables detection at every point along the kill chain, making it possible to mitigate threats before any material...