In this role, the selected candidate must have experience with conducting application threat modeling, security risk assessments, security control assessments, and vulnerability assessments using open source and commercial tools and manual methods.
In this role, you will be responsible to performs forensic analysis of digital information and gathers and handles evidence. Identifies network computer intrusion evidence and perpetrators. Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types.
In this role, the selected candidate will analyze security logs generated by Intrusion Detection/Prevention Systems, firewalls, network flow systems, Anti-Virus and other security logging sources in correlation with vulnerability analysis.
In this role, you will create signatures (e.g. Yara) to monitor and identify indicators associated with APT to utilize in Virustotal (or other datasets) and in support of network defense and incident response efforts.
In this role, you will be responsible for working independently with general instruction, adapt and apply Noblis principles, concepts, processes, tools and methodologies to solve real-world problems in a team environment.