Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

Info management d.o.o. - otvorena pozicija za Forensics Analyst, Dubai

[es] :: IT berza poslova :: Arhiva IT berze poslova :: Info management d.o.o. - otvorena pozicija za Forensics Analyst, Dubai
(Zaključana tema (lock))

[ Pregleda: 1074 | Odgovora: 0 ] > FB > Twit

Postavi temu

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

Info Management
Igor Grgur
Info management
Novi Sad

Član broj: 303722
Poruke: 11
*.dynamic.isp.telekom.rs.

Sajt: www.infomanagement.co.rs


Profil

icon Info management d.o.o. - otvorena pozicija za Forensics Analyst, Dubai01.06.2012. u 14:36 - pre 144 meseci
Period projekta: 11 Meseci, Start 01. Juli
Krajnji rok za prijavu kandidata: 04.06.2012.
Tel: 063 652 725 Igor Grgur
[email protected]
www.infomanagement.co.rs


• Vulnerability & Malware Specialist ----- 1
• Forensics Analyst ----1
• Threat Specialist ---- 1

1. DOS & DDOS attacks Analysis.
2. websites needs to be malware free. Ensure malware should identify before it spreads over the du internal network.
3. Monitor the policy violation based log collection.
4. Monitor traffics based on telecom regulatory.
5. Monitoring Anti-phishing sites
6. Coordinate with multiple ISPs to take down the phishing sites.
7. Monitor the data theft attempts based on log source.
8. Provide the RCA on incidents which may lead to damage business.
9. File System and Data Layer Examination
10. Metadata and File Name Layer Examination
11. File Sorting and Hash Comparisons
12. Discovering Unknown Malware on a Host
13. Recovering Key Windows Files
14. Application Footprinting and Software Forensics
15. File System and Data Layer Examination
16. Metadata and File Name Layer Examination
17. File Sorting and Hash Comparisons
18. Discovering Unknown Malware on a Host
19. Recovering Key Windows Files
20. Application Foot printing and Software Forensics

• Malware Analysis
1. Determine the most appropriate method of protecting original evidence and recovering deleted, erased, hidden and encrypted data.
2. To discover & catalogue indicators of compromise that will reveal other machines that has been affected by same malwares or intruders.
3. To identify the intruders or insider that is responsible for installing the malware.
4. REVERSE ENGINEERING WORK-FLOW
5. Setup of an Isolated Analysis Environment
6. Execution and Initial Analysis
7. Deobfuscation
8. Disassembly
9. Identify and analyze relevant portions

• Digital Forensic Analysis
1. Conduct examinations of computers, system logs, applications and networks to locate evidence as an expert in the specialty area of forensics.
2. Demonstrate proficiency in computer crime investigation, forensic data analysis, application fraud, etc.


[Ovu poruku je menjao Info Management dana 02.06.2012. u 16:36 GMT+1]
 
0

[es] :: IT berza poslova :: Arhiva IT berze poslova :: Info management d.o.o. - otvorena pozicija za Forensics Analyst, Dubai
(Zaključana tema (lock))

[ Pregleda: 1074 | Odgovora: 0 ] > FB > Twit

Postavi temu

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.