Home cyber
 

Keywords :   


Tag: cyber

Looking for a New Gig? How About Cyber Crime Spy School?

2018-03-23 14:14:44| PC Magazine Security Product Guide

Facebook is hiring a digital forensic team to audit Cambridge Analytica. How does that work? We talked to two USC professors about how to get started in computer and digital forensics.

Tags: school crime cyber spy

 

US Hits Russia With Sanctions Over Cyber Attacks

2018-03-16 13:16:48| PC Magazine Security Product Guide

In addition to election meddling, Russian hackers also attacked the energy, nuclear, water, aviation, and critical manufacturing industries, the White House says.

Tags: hits russia attacks cyber

 
 

Cyber Security Monitoring Analyst

2018-03-13 16:24:36| Space-careers.com Jobs RSS

Description For this role, you will have the opportunity to monitors and analyses security events from multiple sources and manages security incidents to ensure a coordinated, timely and effective response to security incidents. You will also supports key security management processes by providing intelligence from security incidents and identified vulnerabilities and threats. Tasks and Activities The scope of work will include Monitor and analyse security events from the SIEM as well as from other sources to identify security incidents Tune and maintain security monitoring tools including but not limited to SIEM platform regarding log sources onboarding, log parsing and interpretation, rulesalertsreports definition, SIEM static data management assets, networks etc., Followup and tuneup all false positives alerts together with the responsible system owner Collect and analyse security information from different information resources to identify relevant threats and vulnerabilities and disseminate synthesized intelligence information within the organization Manage security incidents to ensure a coordinated, timely and effective response to security incidents Assess and triage security incidents and coordinate the appropriate notifications and escalations in a timely manner Record and document security incidents, including analysis results, the timeline of events and incident response activities Support the organizations security incident response readiness by contributing to the definition, implementation and continuous improvement of security incident response framework, including relevant policies, processes and procedures, incident response tools Provide synthesized intelligence including statistics and KPIs from different information resources and security incidents to support key security management processes Travel and oncall duty as required Optional Perform technical analyses of security threats and incidents, including malware analysis, network and system forensic analyses Skills and Experience The following skills and experience are mandatory Degree in Computer Science and minimum of 1 year industry related experience in computer security and incident response Good experience in security monitoring SIEM including analyzing and triaging of security events from various sources Experience in responding to security incidents Knowledge of and handson experience with state of the art incident response and forensics tools, techniques and tactics Experienced in capturing memory, disk images and network traffic and analyzing them for indicators of compromise Good programming and scripting skills in different programmingscripting languages would be an advantage Good understanding of the tools and tactics used by different threat agents Knowledge of computer forensics, security vulnerabilities and exploits Knowledge in system security, application security and network security Knowledge of security technologies, such as Antivirus, Network and Host Intrusion Detection Systems, Web ProxyContent Filtering, Authentication technologies, Security Information and Event Management Autonomous, innovative mind with sound analytical skills Stress resistance and able to manage multiple incidents and tasks at the same time Experience with a top tier SIEM solution e.g., HP Arcsight, IBM QRadar, Splunk for Security, EMCRSA Security Analytics is a plus Relevant security certifications e.g., GCIH, GCFE, GCFA, GREM, GCIA and product certifications are a plus Experience in malware analysis and reverse engineering would be an advantage Good written and verbal communication skills in English Excellent team player Ability to effectively respond to and interact with all levels of organizational staff How to Apply Looking to take your career to the next level? Interested applicants should submit their CV and Cover Letter to RHEAs Recruitment team at careersrheagroup.com no later than 26032018 Preference will be given to candidates eligible for an EU or national personal security clearance at the level of CONFIDENTIAL or above. About RHEA Group RHEA Group is a leading engineering consultancy firm with demonstrated expertise in space, system and secure software solutions. We attract skilled engineers, scientists and management professionals and offer a range of exciting career paths working alongside clients such as the European Space Agency, the European GNSS Agency, EUMETSAT and NATO.

Tags: security monitoring analyst cyber

 

Cyber Security Architect fm

2018-03-07 11:25:53| Space-careers.com Jobs RSS

Are you looking for a position as a Cyber Security Expert in Southern Germany? As a specialist in engineering and technology, AKKA Technologies has developed expertise in the areas of project management, system engineering, embedded software, mechatronics and the assembly, integration and testing of satellites. As a partner of major contractors in the space field, the AKKA Group stands among the most influential players in European space projects for more than 30 years. Your tasks You are responsible for the development, integration and implementation of complex cyber security solutions Furthermore, you are responsible for the system architecture design and documentation You conduct risk analysis to prevent and manage potential global security You are also responsible for the optimization and extension of existing security systems in compliance with specified standards Requirements Bachelor Master in computer science, mathematics or a comparable technical degree Experience in cyber security, architecture and security processes and methods Knowledge of cyber security tools and experience in their application Good written and spoken English knowledge

Tags: security cyber architect cyber security

 

Cyber Security round-up

2018-03-01 19:00:00| Oil IT Journal - www.oilit.com

Sector and #8217;s cyber worries. Hacking back! Scada monitoring. Cyber information sharing. SEI emerging tech risk survey. EU CERT. Frankenstack! Siemens/Tenable. Crystal and #8217;s Rugged firewall. Accenture and #8217;s cyber blooper. Lamentable results from Honeywell cyber survey. Oildex advice on Spectre bug.

Tags: security cyber roundup cyber security

 

Sites : [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] next »