Get new jobs by email
  •  ...reconstruction. Map incidents to MITRE ATT&CK framework techniques. Network & Cloud Forensics Analyze PCAP, NetFlow, DNS, proxy, and firewall logs. Investigate suspicious lateral movement and command‑and‑control traffic. Perform forensic investigations within... 

    DeepSource Technologies

    Jeddah
    2 days ago
  •  ...investigations using EDR solutions such as Microsoft Defender for Endpoint, CrowdStrike Falcon, or equivalent. Analyze firewall, proxy, VPN, IDS/IPS logs (e.g., Palo Alto, Fortinet, Cisco). Monitor and investigate suspicious email threats (phishing, malware, BEC).... 

    DS DeepSource

    Jeddah
    15 hours ago