Free Essay

Security Job Search

In:

Submitted By EvaCummins
Words 585
Pages 3
Eva Cummins IS255 Assignment 2 Security Job Search

Job overview
Company: Technisource
Base Pay: $80,000 - $120,000/Yr
Title: Forensics Managing Specialist –Security

JOB DESCRIPTION
All Forensics Candidates are encouraged to apply. Jr. to Sr. level positions are available from 2 years to 10+ years experience. Salary based on experience. A Bachelor's Degree in Forensics or related is a plus. This is a full time perm position. Must be willing to travel nationwide.

Our client’s computer forensics team is a comprehensive solution for global data collections and forensic analysis. They offer best-in-class security. From small to large matters, they provide easy to understand interpretations of findings and a single point of contact. The Managing Consultant utilizes state of the art techniques that enable the recovery and use of critical electronic evidence for litigation, investigations and other fact-finding exercises. The Computer Forensics Managing Consultant establishes whether evidence has been erased or modified; analyzes electronic content and patterns of Internet and e-mail usage; recovers deleted data; and assesses and explains metadata within recovered files.
RESPONSIBILITIES
Manage day to day activities for projects involving computer forensics, information security or rapid response data breach matters.
Manage large data preservation and collection activities to ensure that accepted forensic protocols; create and maintain Chain of Custody; document the handling of evidence.
Analyze log files from firewalls, web servers and computers.
Conduct forensic analysis and write reports; affidavits; and documentation of findings, based on customer objectives.
Diligently manage individual schedule and ability to provide support on multiple projects during a given week.
Manage large scale and long term projects.
Understand business continuity, identify and access management, network security, cyber security, data protection and privacy, and understand the impact of these activities on a forensic investigation.
Ability to independently perform standard computer forensics activities to advise senior consultants, consultants and associates in areas where they may not have experience.
Collect and preserve data using accepted forensic protocols; create and maintain chain of custody; document the handling of evidence.
Conduct forensic analysis, interpret results and construct affidavits and formal reports.
Manage projects and mentor other project team members.
Present finding to clients both formally and informally.
Utilize Microsoft Word, Excel, PowerPoint, Project and Visio for delivery of certain content to clients, as well as to provide standard documentation for project reporting and updates.
Maintain proficiency with industry standard tools, policies and practices.
Maintain a high level of professionalism at all times.
Continually develop and broaden your forensic, consulting and project management skills by seeking training and mentorship.

JOB REQUIREMENTS
Qualifications
Bachelors degree required
2+ years experience in computer/network forensics and consulting
Experience with commercial computer forensics software, such as: Guidance Software, FTK, Access Data, Paraben, BlackBag and others.
Knowledge of computer forensic best practices for search and seizure of digital evidence.
Knowledge of computer hardware and software including network devices and network protocols
Certifications desired: CFCE, CCE, EnCE, ACE, and CISSP
Ability to obtain and maintain EnCE certification within 18 months of hire.
Travel will vary based on clients needs, and could result in up to 75% travel.

Careerbuilder.com
I think that this would be the ideal job to do because it is in the security field and the forensics field and I believe it would be a fun and interesting job to do everyday and definetly would not be boring for sure. This article has given me more of a focus and path that I definetly want to pursue and get more schooling to achieve.

Similar Documents

Premium Essay

Underpinning Knowledge and Understanding

...STANDARDS FOR UNARMED SECURITY GUARD [PRIVATE SECURITY SECTOR] Font: Callibri(Body),Font size 16 Contents 1. Introduction and Contacts..…Page no. 1 2. Qualifications Pack……….……...Page no. 2 3. OS Units……………………..…….….Page no.2 4. Glossary of Key Terms …………Page no.3  OS describe what individuals need to do, know and understand in order to carry out a particular job role or function  OS are performance standards that individuals must achieve when carrying out functions in the workplace, together with specifications of the underpinning knowledge and understanding Insert your SSC picture here Introduction Qualifications Pack – Unarmed Security Guard SECTOR: PRIVATE SECURITY SUB-SECTOR: 1. COMMERCIAL 2. INDUSTRIAL OCCUPATION: GUARDING REFERENCE ID: SKS/Q0101 ALIGNED TO: NCO-2004/9152.30 An Unarmed Security Guard in the Private Security Sector form the first level of defence and notice and encounter threats and risks that are detrimental to life, property and premises. Security Guard is responsible for monitoring premises and property through physical presence and by using security and protection systems. Brief Job Description: The primary role of the individual entails guarding designated premises and people by manning the first tier of protection aided by appropriate security devices/equipment. The core responsibility includes guarding against theft, criminal acts, emergencies, fire and other contingencies. Personal Attributes: An Unarmed Security Guard needs to bear...

Words: 8254 - Pages: 34

Free Essay

Fin 324 Week 5 Learning Team Assignment Investor Profile Paper

...Learning Team Assignment Investor Profile Paper Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser https://hwguiders.com/downloads/fin-324-week-5-learning-team-assignment-investor-profile-paper/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Two lenders Sears and Roebuck use are HSBC Bank USA, National Association, and CitiCard. HSBC Bank USA, National Association is a bank that operates out of New York City with it s head office in Mclean Virginia (“RENAISSANCERE HOLDINGS LTD 2007). The bank is chartered in the National Bank Act and the Office of the controller of the currency, which is a part of the US Department of the treasury, regulates this bank (“8-K: HSBC USA INC /MD 2007). Sears credit card business is operated by CitiCard the world’s largest provider of credit cards. The investment back that Sears and Roebuck use to issue stock is Citi Bank. An investment back its job is to raise capital for Sears. Citi Bank sells securities to public investors in order to do this. The securities can come in the form of bonds or stocks. An investment bank performs two functions; mergers and acquisitions advisory and underwriting. The mergers and acquisitions side of the corporate finance, bankers perform the negotiating and mergers between two companies. Underwriting involves the process of raising capital for...

Words: 5329 - Pages: 22

Premium Essay

Project 1 - Ccjs 321 Digital Forensics

...INCIDENT rEPORT CCJS 321 – Digital Forensics | Stan Vos Date of submission: FEB 5, 2016 | INCIDENT rEPORT CCJS 321 – Digital Forensics | Stan Vos Date of submission: FEB 5, 2016 | Project 1 - CCJS 321 Digital Forensics For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist, an employee of the Makestuff Company, assigned to the company’s Incident Response Team. In this case, you have been notified by Mr. Hirum Andfirum, Human Resources Director for the Makestuff Company, that the company has just terminated Mr. Got Yourprop, a former engineer in the company’s New Products Division, for cause.  Mr. Andfirum tells you that at Mr. Yourprop’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from Makestuff, with ALL I have to offer.”  Mr. Yourprop’s statements made Mr. Andfirum fear he might be taking Makestuff’s intellectual property with him to his new employer (undoubtedly a Makestuff competitor).  In particular, Mr. Andfirum is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next three years.  Mr. Andfirum provides you a copy of the source code to use in your investigation.  Lastly, Mr. Andfirum tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in...

Words: 1700 - Pages: 7

Free Essay

Week F

...[pic]Skip to search. • [pic]Hi, Deirdre o You are signed in as: deirdred3 o Profile o Account Info o Sign Out • Help Get new Yahoo! Mail apps •   Notifications Help • Mail1 • My Y! • Yahoo! Yahoo! Finance Top of Form |Search [pic] |Search Web | [pic] Bottom of Form Breaking News Visit Yahoo! News for the latest. ×Close this window • HOME • INVESTING o Market Overview o Market Stats o Stocks o Mutual Funds o ETFs o Bonds o Options o Industries o Currencies o Education o Commodities • NEWS o Markets o Investing Ideas o Special Editions o Company Finances o RSS Feeds o Video o Photos & Interactives • PERSONAL FINANCE • MY PORTFOLIOS o My First Portfolio o View All Portfolios o Create Portfolio o Market Tracker • EXCLUSIVES o Breakout o The Daily Ticker o The Exchange o Unexpected Returns o Financially Fit o Just Explain It o Hot Stock Minute • CNBC o Big Data Download o Off the Cuff o Talking Numbers o Latest Headlines • Career & Education • Insurance • Lifestyle • Loans • Real Estate ...

Words: 2144 - Pages: 9

Premium Essay

The Paper of Individual Rights as Well as Public Safety

...discussed focal points will start with statutory authority also responsibilities of government officials, security personnel, also private citizens. Next is the practice or law relating to search, seizure, as well as surveillance by police, corrections, security personnel, also private citizens. Also, compare the laws relating to the use of force by police, corrections, as well as private security. Lastly, Individual privacy rights and legislation relating to policy, practice, and procedures. In the country of the United States, which is a delegate for democracy and everything it stands for to this society. It means that the laws and regulation, give the show the will of the people also the officials in the government imitate. Also, enforce the rules and the laws according to the local, state, and as well federal rules. Shows the United States a points officials as well as, they have to swear into their position and have to pledge they will uphold the responsibilities of the job also the laws of their job. The public of the United States has to pay their taxes so that it can help to assist the government to give protection to society. Also, secure the life of people in society their property from thieves, and robbers, as well as help the government to run fluently (Dictionary of American History, 2003). Statutory authority and obligations of government authorities, security faculty, and private civilians With the government, there are various kinds of officials like mayors;...

Words: 2153 - Pages: 9

Premium Essay

Internet Recruiting

...accessing the internet. Making it imperative that the website is able to load quickly in all frames of connection (load time is critical to any website) anything after 3-5 seconds has a high chance of being closed out by the user. The site must be friendly and easy to navigate while containing enough detailed information about the company, the position, and requirements. Ensuring that applicants are able to upload or paste and copy in resumes. Not all applicants want to fill out applications, this can keep many qualified applicants from applying. Lastly, security, the highly most important thing of online recruitment. As, there is much personal information given out by applying applicants it is highly important that this information is secured. Social security numbers along with any other information that can cause a breach in identity must be encrypted. This will protect those applicants in the data base if the security system is breached. While design is highly important for a recruitment website. Accuracy of using the software is critical for the company success...

Words: 646 - Pages: 3

Premium Essay

Module 2, Written Assignment 2

...Edison State College   Module 2 – Written Assignment 2 This paper describes why search engines and databases produce different types of queried results. Two (2) separate search tools were used and this paper attempts to explain why there are differences in search results obtained from each search tool and evaluate the quality of their search results.   Module 2 – Written Assignment 2 Searching for information via the Internet will always produce invariable results. This notion can be exaggerated depending upon the tools one uses to query for information. That is not to say that the Internet cannot be used as a valuable research tool. On the contrary, studies have been conducted to support the use of Internet-based research in many fields, including the medical field (Ahern, 2005). While the Internet search engine can be a powerful tool for research, it should be noted that not all search engine tools are created equal. Different Internet search engines will in fact return different results. Therefore, great care must be taken to ensure that the appropriate search engine is chosen for the job. Some of the different types of search engines include: Crawlers, Directories, Meta, Hybrid and Specialty. Search query options enable users to refine their searches in an attempt to find more relevant information. These particular options vary according to the search engine. Additionally, each search engine uses a different method of searching and retrieving data, also referred...

Words: 904 - Pages: 4

Premium Essay

Assignment 1

...Physical, Dynamic and Procedural Security Considerations in a Custodial Environment Physical Security Cells: Cells are essential for the effective security of a prison as they are used for the accommodation of inmates. This is where a prisoner place will spend most of their time during their time in prison. Work, education, rehabilitation programmes, visits or exercise and recreational time are the only times that an inmate can leave their cells. . In some cases an inmate may only leave their cell for a short period of time over a 24 hour period. Inmates’ cells are often checked daily as part of a routine and searches are put in place to ensure high levels of security and safety are upheld. <> Prison Officers: Prison officers have a critical role in physical security as they will have the job of patrolling the prison and surrounding areas to ensure that they are secure. They will also guard critical areas such as the main entrance and cell blocks. Throughout the day and night they will conduct routine checks of all security areas - some will be frequently checked whilst others will be checked when necessary. They will also have the role of responding quickly to alarms or calls for backup from colleagues well as questioning and reporting suspicious behavior. Search Area: The search area will cover the whole prison, however some areas will be searched on a regular basis (routine) whilst other areas will be checked when security concerns or information available...

Words: 1516 - Pages: 7

Premium Essay

Close Protection Public Services Unit 18

... 04/04/16 Unit Title: Security Procedures in the Public Services Unit N: 18 P1. Identify the threats and the consequences of a failure in securities that exist to the security of people, property and premises in a public service. ..For this example we take a nightclub with a capacity of about 300 people. My role is DS – doorman. We have to secure the safety of premises, people and everyone. Potential threats that we possibly can have are: 1. Drunken people coming in 2. Drug pushers trying to get in and sell their drugs inside 3. Overcrowding 4. People bringing weapons in M1. Explain the use and application of the most suitable security measure to deal appropriately with the threats. In this case the most suitable security measures to deal appropriately with these threats would be: 1. Drunken people – you can refuse the entry for them. 2. Drug pushers - you can search them; if the drug is found you confiscate it, secure in a secured place and then refuse the entry for them 3. Overcrowding – you use the special counter to count the amount of people who went in and when the critical mass is approaching (in our case it is something like 250-260 people) you have to come out to the queue and tell people that they may or may not be admitted because there is not enough space inside of a venue. 4. Weapons – you search them; if the weapon is found you confiscate it and refuse the entry. In...

Words: 1214 - Pages: 5

Premium Essay

Essay On Criminal Justice

...capstone research paper i will be talking about Criminal Justice. Criminal justice is the system of practices and institutions of governments directed at upholding social control, deterring and mitigating crime, or sanctioning those who violate laws with criminal penalties and rehabilitation efforts. https://www.bing.com/search?q=what+is+criminal+justice&form=EDGTCT&qs=SC&cvid=84f4f0a397c9430e8ab447b16414819e&cc=US&setlang=en-US&PC=DCTS Breakdown of criminal justice degree jobs : Security Guard Park naturalist Private detective or investigator Probation officer Correctional officer Security Guard Job Description. Security guards, also known as security officers,...

Words: 1173 - Pages: 5

Premium Essay

Design and Implement Security Operations Management Best Practices

...Overview View the Demo Lab available in the Practice section of the Learning Space Unit 10 and answer the following questions. This lab presents the process of how to design and implement Security Operations Management Best Practices. The Instructor will demo how to gather all the information necessary to implement a Security Operations Management Best Practices solution with the use of Splunk. This lab will thoroughly evaluate the student’s knowledge of the infrastructure worked on and built throughout the course as well as their capability to bring it all together. Lab Assessment Questions & Answers 1. During the Instructor demo lab, how did he connect to the Splunk management tool? a. Using an IP address as the URL (loopback) 2. What are the main functions of Splunk, a log management and alerting tool, that were demonstrated by the Instructor and why do they help build more secure operations? a. Monitors and logs network data and events and alerts users and admin of said events. This allows admins greater awareness of network activity and specifically security. With this tool, admins can more effectively plan their network security strategy. 3. What types of “Data Inputs” are available in Splunk and most other log management tools? a. Scripts, files, directories and network ports 4. What types of “Alert Conditions” are available in Splunk and most other log management tools? a. A Basic Conditional Alert is a trigger that is set off when a certain...

Words: 410 - Pages: 2

Free Essay

Case : Linkedin

...Case 1: LinkedIn YouTube is for video entertainment; iTunes services music lovers; Facebook is primarily for socializing; Flickr is for photo exchange; Second Life and World of Warcraft are for participating in virtual communities; Gamezone and Shockwave are for gamesters; and so on and so on. It would seem that the Web has anticipated all of our needs and responded. But wait, what’s out there for those of us who want to further our professional lives to visit with others in our field of expertise, to look at jobs that are available in other parts of the world, to find out what’s happening in the business world outside our own familiar circle, and to garner introductions to those who might help us succeed? LinkedIn is an online service that fills this niche. LinkedIn advertises itself as “an interconnected network of experienced professionals from around the world, representing 150 industries and 200 countries. You can find, be introduced to, and collaborate with qualified professionals that you need to work with to accomplish your goals.” As of 2010, LinkedIn had over 60 million members, half of whom were from countries outside the United States, and has executives from all Fortune 500 companies in its ranks. LinkedIn is growing rapidly, with a new member joining approximately every second. Reid Hoffman, a former executive vice president of PayPal, founded LinkedIn in 2002; the service was launched in May 2003. Hoffman remains chairman of the board at LinkedIn, which is based...

Words: 855 - Pages: 4

Free Essay

Research Proposal

...the institution opened satellite colleges in Githunguri, Kericho, Eldoret and Kisumu all now under the School of Professional Programmes. Abstract The key HR aims at the KCA University are recruitment, retention and development of the very best academic staff and high quality administrative staff to support its corporate vision of being a World Class Business University of Choice and the leading University for practicing professionals. The University recognizes that whilst its academic and research staff  have a key role in delivering its overall strategic aims, non-academic staff at all levels aim to provide appropriate level of support to enable academic staff concentrate on their core functions. Recruitment is the act of applying for a job as a result of being unemployed or discontent...

Words: 3271 - Pages: 14

Premium Essay

Detective, Criminal Investigator

...Detective, Criminal Investigator Introduction Detectives investigate crimes. They also search for and apprehend criminals. Unlike a uniformed officer, detectives follow up on crimes that have already been committed, rather than patrol the streets in order to prevent a crime. Depending on the agency, criminal investigators may work Monday to Friday, unlike uniformed officers who often work rotating shifts. However, because crime happens at all hours, detectives are subject to be called out to respond to crime scenes at all hours of the day or night, as well as weekends. Detectives and criminal investigators may specialize in specific crimes, such as Crimes against persons, Property crimes, Homicide, Sex crimes, and White collar crimes. When first called out to investigate a case, a criminal investigator can expect to work long hours. It is imperative to gather as much fresh evidence as possible and to track every fresh lead. As a result, it is not uncommon to work up to 20 hours straight, or more, after initially responding to a scene. Detectives and criminal investigators also deal compassionately with people. They should feel comfortable speaking with witnesses and suspects, as well as be prepared to answer any questions, deal with grieving families, and work closely with other components public security organizations Detectives need to be able to take control of a crime scene and feel comfortable running an investigation. Detective, Criminal Investigator A detective or criminal...

Words: 1335 - Pages: 6

Free Essay

Sox/Dodd Frank/Jobs Act

...Repeal It is logical to believe that Sarbanes Oxley Act, Dodd Frank Act and JOBS Act exists for a reason. Although politic is a very complicated topic and has some sort of influence in establishing a new federal law, SOX, Dodd Frank Act and JOBS Act are reasonably justifiable. After WorldCom and Enron incidents, Sarbanes Oxley Act was established to regulate auditors and public company. After Late 2000’s mortgage crisis and others, Dodd-Frank and JOBS Act was established to regulate financial industry under federal government. Federal regulation seems like always came after a big crisis or downfalls to fix the issue and hopefully prevent future reoccurrence. However, federal government looked like a little bit too reactive because the regulations were always enacted after something bad happened. To make the matter worse, there is no way to proactively prevent any or all frauds or misconducts from happening due to their variety of types. In order to discuss should Sarbanes Oxley, Dodd Frank and JOBS Act be repealed, let’s look into each Act individually and in a more detail sense, In Sarbanes Oxley, some of the important aspects that SOX 2002 deals with are auditor independence and enhanced financial disclosures. It also established Public Company Accounting Oversight Broad (PCAOB) to monitor and oversee public firm’s financial activities. Because there was lack of Audit regulations, it later leaded to the big Enron fraud. Therefore it was clear that something has to be done...

Words: 644 - Pages: 3