Average salary: $119,550 /yearly
More statsSearch Results: 32 vacancies
...and beyond.
The exceptional EY experience. It's yours to build.
The opportunity: your next adventure awaits.
Assurance - Forensic & Integrity Services - Investigations – Intern
The EY Forensic & Integrity Services practice advises corporations on complex business...
Suggested
Summer work
Internship
Worldwide
...and special warfare operations Cryptologic Technician Networks (CTN) - CTNs serve as experts in communication network defense and forensics. Their responsibilities include: Monitoring, identifying, collecting and analyzing information Providing computer network risk mitigation...
Suggested
Full time
Work experience placement
Worldwide
Overseas
...operations, investigating and tracking enemies while also protecting our networks from attacks. As an expert in communication defense and forensics, you’ll be expected to rise to the ever-evolving challenge of maintaining cybersecurity.
INTELLIGENCE SPECIALIST
Collect...
Suggested
Full time
Part time
Worldwide
Overseas
...anywhere in the world. Lerch Bates offers integrated specialties, including vertical transportation, logistics, enclosures & structures, forensics, and multidisciplinary building lifecycle services that optimize performance from design, construction, and management to forensic...
Suggested
Full time
Temporary work
For contractors
Internship
Relocation package
...parallel development, testing and production environments.
Review SNMP alerts, use protocol-line analyzers (sniffers) and conduct log forensics to determine root cause analysis and resolution of complex issues.
Collaborate with Software and Database Developers, Windows...
Suggested
Hourly pay
Holiday work
Contract work
Temporary work
Work experience placement
Remote job
Night shift
Weekend work
...operate solutions for cryptanalytic capabilities and techniques to exploit cryptographic systems
Solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target...
Suggested
Holiday work
Temporary work
Flexible hours
...Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). In lieu of a degree, at least two (2) years of...
Suggested
Contract work
Remote job
...Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensic, Cyber Security, Software Engineering, Information Assurance, or Computer Security OR
Eleven (11) years of experience and a Bachelor...
Suggested
...framework.
Have interest in cyber and intelligence focused projects to support computer network operations, cyber security and forensic missions, intelligence knowledge systems, and other related missions.
Work with current project teams to support ongoing intelligence...
Suggested
Holiday work
Contract work
Temporary work
Performs with confidence, both the forensic and clinical specimen collection. Phlebotomy experience - pediatric and geriatric capillary and venipuncture - required. Phlebotomy Certification required; if in CA, then California Phlebotomy Technician Certification required...
Suggested
...perform daily activities accurately and on time. Maintain a safe and professional environment.
Performs with confidence, both the forensic and clinical specimen collection and processing duties following established practices and procedures.
Perform verification of...
Suggested
Work experience placement
Local area
...Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military training/...
Suggested
For contractors
Local area
...knowledge of cybersecurity principles, best practices, and industry standards
~ Experience with security incident response and forensic analysis
~ Network security protocols and technologies
~ Security assessment tools and methodologies
Strong documentation...
Suggested
Remote job
...solutions to hard cryptologic computer science problems within a scientific framework.
The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target systems...
Suggested
...engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a...
Suggested
...Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
An A.S. and four (4) years of experience...
Contract work
...systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration....
Full time
Local area
Worldwide
...daily activities accurately and on time.
Maintain a safe and professional environment.
Performs with confidence, both the forensic and clinical specimen collection and processing duties following established practices and procedures.
Perform verification...
Holiday work
Contract work
Work experience placement
Flexible hours
...Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR
Eight (8) years of experience and an Bachelor...
...engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a...
Home office