Get new jobs by email
- ...reconstruction. Map incidents to MITRE ATT&CK framework techniques. Network & Cloud Forensics Analyze PCAP, NetFlow, DNS, proxy, and firewall logs. Investigate suspicious lateral movement and command‑and‑control traffic. Perform forensic investigations within...
- ...investigations using EDR solutions such as Microsoft Defender for Endpoint, CrowdStrike Falcon, or equivalent. Analyze firewall, proxy, VPN, IDS/IPS logs (e.g., Palo Alto, Fortinet, Cisco). Monitor and investigate suspicious email threats (phishing, malware, BEC)....
