This range is provided by Aditi Consulting. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more. Base pay range $65.00/hr - $66.78/hr Payrate: $65.00 - $66.78/Hour Core Job Functions Include: Investigations - Investigating computer and information security incidents to determine extent of compromise to information and automated information systems. Escalations - Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Research - Researching attempted or successful efforts to compromise systems security and designs countermeasures. Education - Maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption. Communications - Provides information and updates to shift leads & leadership, creates pass-downs for next shift, works closely with supporting teams, provides feedback for new security policy and standards, engages with other teams and adjacencies through email and conference calls. Digital Forensics - As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law. Coverage - Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed. Should be proficient with: Offensive Techniques - Penetration testing, IOCs, and exploits at all layers of the stack. Logs - You should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats. System Forensics - Basic understanding of image acquisition techniques, memory forensics, and the like. Networking Fundamentals - TCP/IP Protocols ( DNS, FTP, DHCP, ARP, etc.), and Wireshark/TCPDump. Scripting - Should be familiar with scripting in at least one of the following: python, perl or a similar language. Risk Analysis - Evaluating a vulnerability in a particular environment and understanding the associated risks to enterprise systems. Qualifications: Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field. Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics. Must have at least one (1) of the following certifications: SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH.
...business development skills Fast-track to Senior then Principal candidate for peopel with a rainmaker mindset (50% technical / 50% BD) Apply Now! If youre interested apply directly through this advertisement, or send over an up-to-date resume to gfiler@...
...Accredited Residency training Licensed or willing to be licensed in the State of Texas Board Certified and/or Board Eligible in Internal Medicine Preferred Qualifications: ~ Bilingual (English/Spanish) fluency The salary range for this role is $260,000 to...
...the application process. This position provides comprehensive HR support, coordination and counsel related to a wide variety of... ...an accredited four year college or university at the time of the internship Must have sophomore, junior, or senior class standing Must...
...System Safety Engineer II at Raytheon summary: A System Safety Engineer II develops and implements MIL-STD-882E compliant system safety programs, performing management, analysis, evaluation, and verification tasks. They assess engineering hardware, software, and schematics...
...Description Salary: Position Summary: This entry-level role supports the planning, tracking, and reporting of construction project schedules with a strong emphasis on data... ...Scheduler will work closely with project management and field teams to maintain detailed MS...