DUTIES & RESPONSIBILITIES:

1.       Incident Response: Respond to cybersecurity incidents such as data breaches, malware infections, unauthorized access, and other cyber threats. This includes assessing the scope and impact of the incident and taking immediate steps to contain and mitigate the threat.

2.       Digital Evidence Collection: Use forensic tools and techniques to collect and preserve digital evidence from various sources including computers, servers, mobile devices, and networks. Ensure chain of custody and maintain integrity of evidence to support legal proceedings if required.

3.       Forensic Analysis: Conduct forensic investigations in response to cyber-attacks and security breaches on compromised systems and networks. Analyze digital evidence to identify the root cause of incidents, reconstruct timelines of events, and uncover malicious activities. This may involve examining logs, memory dumps, network traffic, file systems, and malware analysis.

4.       Malware Analysis: Perform in-depth analysis of malware samples to understand their behavior, capabilities, and impact on systems. This includes reverse engineering malware to identify indicators of compromise (IOCs) and develop countermeasures.

5.       Data Recovery and Discovery: Use specialized tools and methods to recover deleted, hidden, or encrypted data that may be relevant to investigations. Conduct thorough searches for digital artifacts that provide insights into the activities of threat actors.

6.       Reporting and Documentation: Prepare detailed forensic reports documenting findings, analysis, and conclusions. Present findings to technical and non-technical stakeholders, including recommendations for remediation and improving cybersecurity posture.

7.       Collaboration and Communication: Work closely with IT teams, cybersecurity professionals, law enforcement agencies, legal teams, and other stakeholders throughout the investigation process. Communicate technical information effectively to non-technical audiences.

8.       Digital Forensic Tools: Proficiency in using a variety of forensic tools such as EnCase, FTK (Forensic Toolkit), Sleuth Kit, Volatility, Wireshark, and others for evidence acquisition, analysis, and reporting.

9.       Independent Task Management: Perform tasks independently with minimal oversight.

Additional Duties: Undertake other tasks and responsibilities assigned by LM and head IS.

工作详细内容

全部职位:
1 发布
工作时间:
早班
工作类型:
部门:
Information Technology
性别:
没有偏好
年龄:
27 - 44 年
最低学历:
学士
职位等级:
资深专业人员
电话预约已成功,我们的专家会在短时间内与你联系:
3年
在之前申请:
Jul 29, 2024
发布日期:
Jun 28, 2024

Telenor Microfinance Bank

· 4501-5000 员工 - 伊斯兰堡, 卡拉奇

pstrongOverview/strong/ppTelenor Microfinance Bank Limited is jointly owned by Telenor Group, the leading telecommunications company across Scandinavia and Asia with 174 million customers, and Ant Financial, the operator of the world's leading payment and lifestyle platform Alipay that's also an affiliate company of Alibaba Group. It is the first scheduled microfinance bank of Pakistan that provides a range of innovative banking solutions./ppTelenor Microfinance Bank created history in 2009, when it launched Easypaisa, Pakistan’s first branchless banking platform and the country’s only GSMA mobile money certified service. With the largest footprint in the country, Easypaisa has since then evolved into a digital lifestyle enabler which is leading the fintech revolution in Pakistan./ppMotivated by its strongvision of ‘transforming the financial landscape of the country’/strong, Telenor Microfinance Bank is on stronga mission to provide ‘instant access to convenient digital financial services’/strong that benefits the people of Pakistan. Telenor Microfinance Bank is empowering people to truly adopt the digital way of life./pp /ppstrongOur Values:/strong/pp• Customer First./pp• Create Together./pp• Keep Promises./pp• Be Respectful./p

你最大的竞争优势

快速得到有竞争力的分析和专业的对你的评定
联系我们团队的专业顾问来提升你的简历
尝试罗资 专业版
我在ROZEE上找到工作啦!