Average salary: $115,500 /yearly
More statsSearch Results: 375 vacancies
...Senior Field Security Investigator. Multiple Locations - Charleston, SC or Jackson, MS - We have an exciting opportunity to join the SIU team as a Senior Field Security Investigator! As a Senior Field Security Investigator, you will conduct investiga Field, Security,...
Suggested
Responsibilities
We are currently seeking to fill a critical role for a full-time DHS Credentialed Background Investigator in the area of Jackson, MS .
The Background Investigator will be responsible for:
Conducting background investigations for the...
Suggested
Hourly pay
Full time
Temporary work
Internship
Local area
Relocation package
...understand and adhere to the necessary procedures and processes to maintain security.
Conduct complex IT data and security forensic investigations.
Conduct internal vulnerability management to meet regulatory and standards compliance.
Require knowledge of domain structures...
Suggested
Holiday work
Temporary work
...encryption, application security, penetration testing, and computer forensics
Ability to evaluate, design, and implement curriculum,... ...Penetration Tester)
CHFI (Computer Hacking Forensics Investigator)
CCFP (Certified Cyber Forensics Professional)
CCFE (Certified...
Suggested
Full time
Work from home
Worldwide
...and recommend security enhancements to all dependent Risk teams and Legal management teams.
Investigate and resolve data security breaches, to include conducting forensic analysis and implementing remediation measures.
Stay up to date on the latest data security...
Suggested
Holiday work
Local area
Remote job
Relocation
H1b
Flexible hours
...including security trends,vulnerabilities,and threats.
Act as a technical consultant on information security incidents and forensic investigations.
Experience with SOAR practices, including playbook development, data and artifact collection, process automation,...
Suggested
Remote job
Worldwide
Flexible hours
...Packet Capture), and other attack artifacts supporting incident investigations.
+ In-depth knowledge of architecture, engineering, and... ...-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, and Network Forensics.
+ Experience with malware analysis concepts and methods.
+ Unix...
Suggested
Full time
Contract work
Work experience placement
Shift work
...skilled and dedicated professionals interested in mission support roles in intelligence, criminal investigation, international trade, procurement, facilities management, forensics, engineering, business administration and more.
WHAT: Chat 1-to-1 with Recruiters via text...
Suggested
Remote job
...our operations. The Tier 2 analyst, will be responsible for investigating and responding to security incidents, understanding, and mitigating... .../Responsibilities:
Understanding of digital evidence and forensic analysis.
Assist in continuously improving the existing...
Suggested
Work experience placement
Local area
Relocation
Work visa
...Duties
WHAT ARE THE APPEALS, CRIMINAL INVESTIGATION, AND TRANSFORMATION & STRATEGY OFFICE DIVISIONS?
A description of the business... ...Scientist
~1560-Data Scientist
~1801-Computer Investigative Forensic Specialist (CIFA)
~1801-Fraud Detective Analyst
~1801-...
Suggested
Permanent employment
Full time
Local area
Remote job
...including the ability to manage budgets, timelines, and resources effectively
Experience supporting investigations using formal chain-of-custody methods, forensic tools and best practices
Working knowledge of IDS/IPS systems, EDR solutions, network infrastructure...
Suggested
Holiday work
Full time
Remote job
Relocation
Flexible hours
...dedicated team of security professionals responsible for performing investigations against a variety of cloud environments, services, and... ...array of security tooling including SIEM, EDR, AV, Scan tools, forensic collection, processing, and analysis tools. A background of...
Suggested
Holiday work
Temporary work
Remote job
Flexible hours
...understand and adhere to the necessary procedures and processes to maintain security.
Conducts complex IT data and security forensic investigations. Conducts internal vulnerability management to meet regulatory and standards compliance. Requires knowledge of domain...
Suggested
Contract work
...signatures and rules, collaborating with incident responders to investigate and respond to security incidents. Stay updated on the latest... ...with internal investigations as a technical resource for forensic artifact collection and forensic disk analysis.
Manage the...
Suggested
Holiday work
Full time
Remote job
Relocation
Flexible hours
...understand and adhere to the necessary procedures and processes to maintain security. Conducts complex IT data and security forensic investigations. Conducts internal vulnerability management to meet regulatory and standards compliance. Requires knowledge of domain...
Suggested
Contract work
For contractors
...understand and adhere to the necessary procedures and processes to maintain security. Conducts complex IT data and security forensic investigations. Conducts internal vulnerability management to meet regulatory and standards compliance. Requires knowledge of domain...
Contract work
...systems and data from intentional or inadvertent access or destruction. Additionally, you will conduct IT data and security forensic investigations, manage internal vulnerability, and ensure regulatory compliance.
Responsibilities:
Perform complex security...
Contract work
...technical skills and strong communication skills to manage multiple investigations with often tight deadlines.
Required Experience and... ...years of experience with
~ Windows log analysis and memory forensics
~ Network traffic analysis
~ Undergraduate degree in computer...
Holiday work
Full time
Work experience placement
Remote job
Relocation
Flexible hours
Shift work
...understand and adhere to the necessary procedures and processes to maintain security. Conducts complex IT data and security forensic investigations. Conducts internal vulnerability management to meet regulatory and standards compliance. Requires knowledge of domain...
For contractors
...understand and adhere to the necessary procedures and processes to maintain security.
Conducts complex IT data and security forensic investigations. Conducts internal vulnerability.
management to meet regulatory and standards compliance. Requires knowledge of domain...
Full time
Contract work
Immediate start