• Discover top-notch solutions for authentic handicap parking permits with ID Lord. Avoid counterfeit issues and ensure compliance with genuine, reliable permits. Visit us for a hassle-free, legitimate parking permit experience.
    https://www.idlord.com/parking-permit-card
    #counterfeithandicapparkingpermit #identity #idlord #identification #parkingpermits
    Discover top-notch solutions for authentic handicap parking permits with ID Lord. Avoid counterfeit issues and ensure compliance with genuine, reliable permits. Visit us for a hassle-free, legitimate parking permit experience. https://www.idlord.com/parking-permit-card #counterfeithandicapparkingpermit #identity #idlord #identification #parkingpermits
    ·99 Views
  • To start a corporation in the USA, first, choose a unique business name and verify its availability with the Secretary of State. Next, file the Articles of Incorporation, detailing your corporation’s name, purpose, and registered agent. Create corporate bylaws to establish internal rules and appoint directors and officers. Obtain an Employer Identification Number (EIN) from the IRS for tax purposes, then hold an organizational meeting to finalize bylaws and issue shares. Ensure compliance with all state and federal regulations, and open a business bank account to manage finances.

    More Info: https://enterslice.com/us/company-registration-in-usa



    https://youtu.be/OWf-PiGg81U?si=ku-EVivydSDcZz4B
    To start a corporation in the USA, first, choose a unique business name and verify its availability with the Secretary of State. Next, file the Articles of Incorporation, detailing your corporation’s name, purpose, and registered agent. Create corporate bylaws to establish internal rules and appoint directors and officers. Obtain an Employer Identification Number (EIN) from the IRS for tax purposes, then hold an organizational meeting to finalize bylaws and issue shares. Ensure compliance with all state and federal regulations, and open a business bank account to manage finances. More Info: https://enterslice.com/us/company-registration-in-usa https://youtu.be/OWf-PiGg81U?si=ku-EVivydSDcZz4B
    ·297 Views
  • In today's digital landscape, the safety of our personal and professional information is paramount. With the increasing prevalence of cyber threats, it’s essential to understand the concepts of data breaches and data leaks. At On Wave Group, we are committed to providing comprehensive solutions to protect your data and ensure your peace of mind. In this blog, we will delve into what a data breach and a data leak are, their significance, and how our services can help you stay secure.

    What is a Data Breach?

    A data breach occurs when unauthorized individuals gain access to confidential data, often resulting in the theft of sensitive information like credit card numbers, social security numbers, and personal identification details. These breaches can occur through various means, such as hacking, phishing attacks, or even physical theft of devices.

    What is a Data Leak?

    Conversely, a data leak refers to the unintentional exposure of sensitive information, often due to careless handling of data or misconfigured security settings. Unlike breaches, which involve malicious intent, leaks can happen accidentally, leading to the same risks if the leaked data falls into the wrong hands.

    Understanding the difference between a data breach and a data leak is crucial for both individuals and businesses. A data breach can have severe financial and reputational implications, leading to loss of customer trust and legal consequences. Meanwhile, data leaks, though sometimes less publicized, can still expose sensitive information and result in identity theft or fraud.

    With cyber threats evolving at a rapid pace, it has become imperative for organizations to implement robust security measures. On Wave Group offers state-of-the-art solutions, ensuring that your data remains protected from breaches and leaks. Our services include advanced encryption, regular security audits, and employee training programs to promote awareness and vigilance against potential threats.

    Conclusion

    Both data breaches and data leaks pose significant risks to individuals and organizations alike. Being informed about these threats is the first step toward safeguarding your sensitive information. At On Wave Group, we understand the intricacies of data security and are dedicated to providing tailored solutions to meet your unique needs.

    Are you ready to take control of your data security? Contact On Wave Group today to learn more about our comprehensive data protection services. Don’t leave your sensitive information at risk—let us help you secure your digital life!

    #DataBreaches#DataLeaks#DigitalSecurity#OnWaveGroup#Cybersecurity

    https://onwavegroup.com/
    In today's digital landscape, the safety of our personal and professional information is paramount. With the increasing prevalence of cyber threats, it’s essential to understand the concepts of data breaches and data leaks. At On Wave Group, we are committed to providing comprehensive solutions to protect your data and ensure your peace of mind. In this blog, we will delve into what a data breach and a data leak are, their significance, and how our services can help you stay secure. What is a Data Breach? A data breach occurs when unauthorized individuals gain access to confidential data, often resulting in the theft of sensitive information like credit card numbers, social security numbers, and personal identification details. These breaches can occur through various means, such as hacking, phishing attacks, or even physical theft of devices. What is a Data Leak? Conversely, a data leak refers to the unintentional exposure of sensitive information, often due to careless handling of data or misconfigured security settings. Unlike breaches, which involve malicious intent, leaks can happen accidentally, leading to the same risks if the leaked data falls into the wrong hands. Understanding the difference between a data breach and a data leak is crucial for both individuals and businesses. A data breach can have severe financial and reputational implications, leading to loss of customer trust and legal consequences. Meanwhile, data leaks, though sometimes less publicized, can still expose sensitive information and result in identity theft or fraud. With cyber threats evolving at a rapid pace, it has become imperative for organizations to implement robust security measures. On Wave Group offers state-of-the-art solutions, ensuring that your data remains protected from breaches and leaks. Our services include advanced encryption, regular security audits, and employee training programs to promote awareness and vigilance against potential threats. Conclusion Both data breaches and data leaks pose significant risks to individuals and organizations alike. Being informed about these threats is the first step toward safeguarding your sensitive information. At On Wave Group, we understand the intricacies of data security and are dedicated to providing tailored solutions to meet your unique needs. Are you ready to take control of your data security? Contact On Wave Group today to learn more about our comprehensive data protection services. Don’t leave your sensitive information at risk—let us help you secure your digital life! #DataBreaches#DataLeaks#DigitalSecurity#OnWaveGroup#Cybersecurity https://onwavegroup.com/
    ·476 Views
  • $50 - $80 / Hour

    Location

    iTalent Digital Pleasanton, CA ( On-site )

    Type

    Full Time

    Status

    Open

    About the job


    iTalent Digital is seeking a Security Analyst to join our clients Cyber Security team. The ideal candidate will be responsible for assigning tasks and overseeing staff in the areas of Security Architecture, developing and updating security policies and standards, security consulting to business departments, security incident management, forensic, security awareness training, threat analysis, new security technologies evaluation, risk assessment, vulnerability/threat identification and mitigation, and security framework design, development and implementation.



    Required qualifications and skills

    5+ Years’ experience in information security
    CISA, CISM, or CISSP Certification is required
    TECHNICAL SECURITY PROJECT MANAGEMENT SKILLS
    WORKING EXPERIENCE USING BEST PRACTICES STANDARDS AND FRAMEWORKS: ISO 27001/27002, PCI:DSS V3; GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF, CIS RAM
    WORKING EXPERIENCE, AT A MINIMUM:
    HARDWARE: NETWORK SWITCHES, ROUTERS, LOAD BALANCERS, SERVERS,STORAGE SYSTEMS, END-USER SYSTEMS, MOBILE DEVICES, OR OTHER DEVICES THAT ENABLE THE ORGANIZATION TO COMPLETE ITS MISSION
    OPERATING SYSTEMS: UNIX, LINUX, WINDOWS o NETWORK: LAN, WAN, INTERNET, PROXY/FILTERING, FIREWALL, VPN, DMZ
    NETWORK PROTOCOLS SUCH AS TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, ETC.
    DATABASES: ORACLE, SQL, MYSQL
    CLOUD PLATFORMS: IAAS, PAAS, SAAS
    SECURITY CONCEPTS SUCH AS ENCRYPTION, HARDENING, ETC.
    GRC
    ACTIVE DIRECTORY
    PROGRAMMING LANGUAGES ARE A PLUS
    Preferred qualifications and skills

    · Strong analytical and critical thinking skills

    · Excellent written and oral communication skills to effectively communicate across all levels of the organization

    · Proven ability to present to a Senior Management Level and Executive audience

    · Working experience of security, policy compliance, and governance frameworks including the

    · NIST-800 series, PCI, ISO 27001/27001, ITIL, and COBIT

    · Expert knowledge in security project management practices

    · Self-motivated/Self-Starter/Proactive, working closely and actively communicating with team

    · members to accomplish time critical tasks and deliverables

    · Working experience in a highly regulated environment and managing information risks and

    · expectations across multiple stakeholder groups

    · Working experience of emergent security risks

    · Convey and explain complex problems and solutions in an understandable language to both

    · technical and non-technical persons

    · Think creatively and critically, analyzing complex problems, weighing multiple solutions, and

    · carefully selecting solutions appropriate to the business needs, project scope, and available

    · resources

    · Take responsibility for the integrity of the solution

    · Ability to be a strategic thinker

    · Demonstrated ability to influence others

    · Experience in managing multiple projects



    Core Competencies:



    · Act with integrity

    · Use sound judgement

    · Commitment to quality

    · Demonstrate adaptability

    · Innovate

    · Think strategically

    · Communicate effectively and influence others

    · Work well both independently and as part of a team



    Education

    Bachelor's Degree

    Company description

    A woman- and minority-owned digital consulting company, we celebrate individuals and diversity, cultivating a culture where our people can excel and lead balanced lives. Recruitment at iTalent is guided by an unwavering principle: Only hire the best. Because we have the best people, we have the privilege of working with the best clients, doing the best work, and effecting transformative change at work and in our communities.



    What you get:



    You get the chance to work with some of the best brands and high-performance teams out there! iTalent offers our W2 consultants excellent benefits such as medical, dental, vision, life insurance, and 401K + matching. We are growing and we want to see you grow!
    About the job iTalent Digital is seeking a Security Analyst to join our clients Cyber Security team. The ideal candidate will be responsible for assigning tasks and overseeing staff in the areas of Security Architecture, developing and updating security policies and standards, security consulting to business departments, security incident management, forensic, security awareness training, threat analysis, new security technologies evaluation, risk assessment, vulnerability/threat identification and mitigation, and security framework design, development and implementation. Required qualifications and skills 5+ Years’ experience in information security CISA, CISM, or CISSP Certification is required TECHNICAL SECURITY PROJECT MANAGEMENT SKILLS WORKING EXPERIENCE USING BEST PRACTICES STANDARDS AND FRAMEWORKS: ISO 27001/27002, PCI:DSS V3; GLBA; HIPPA/HITECH; NIST 800-53; CIS CONTROLS, NIST CSF, CIS RAM WORKING EXPERIENCE, AT A MINIMUM: HARDWARE: NETWORK SWITCHES, ROUTERS, LOAD BALANCERS, SERVERS,STORAGE SYSTEMS, END-USER SYSTEMS, MOBILE DEVICES, OR OTHER DEVICES THAT ENABLE THE ORGANIZATION TO COMPLETE ITS MISSION OPERATING SYSTEMS: UNIX, LINUX, WINDOWS o NETWORK: LAN, WAN, INTERNET, PROXY/FILTERING, FIREWALL, VPN, DMZ NETWORK PROTOCOLS SUCH AS TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, ETC. DATABASES: ORACLE, SQL, MYSQL CLOUD PLATFORMS: IAAS, PAAS, SAAS SECURITY CONCEPTS SUCH AS ENCRYPTION, HARDENING, ETC. GRC ACTIVE DIRECTORY PROGRAMMING LANGUAGES ARE A PLUS Preferred qualifications and skills · Strong analytical and critical thinking skills · Excellent written and oral communication skills to effectively communicate across all levels of the organization · Proven ability to present to a Senior Management Level and Executive audience · Working experience of security, policy compliance, and governance frameworks including the · NIST-800 series, PCI, ISO 27001/27001, ITIL, and COBIT · Expert knowledge in security project management practices · Self-motivated/Self-Starter/Proactive, working closely and actively communicating with team · members to accomplish time critical tasks and deliverables · Working experience in a highly regulated environment and managing information risks and · expectations across multiple stakeholder groups · Working experience of emergent security risks · Convey and explain complex problems and solutions in an understandable language to both · technical and non-technical persons · Think creatively and critically, analyzing complex problems, weighing multiple solutions, and · carefully selecting solutions appropriate to the business needs, project scope, and available · resources · Take responsibility for the integrity of the solution · Ability to be a strategic thinker · Demonstrated ability to influence others · Experience in managing multiple projects Core Competencies: · Act with integrity · Use sound judgement · Commitment to quality · Demonstrate adaptability · Innovate · Think strategically · Communicate effectively and influence others · Work well both independently and as part of a team Education Bachelor's Degree Company description A woman- and minority-owned digital consulting company, we celebrate individuals and diversity, cultivating a culture where our people can excel and lead balanced lives. Recruitment at iTalent is guided by an unwavering principle: Only hire the best. Because we have the best people, we have the privilege of working with the best clients, doing the best work, and effecting transformative change at work and in our communities. What you get: You get the chance to work with some of the best brands and high-performance teams out there! iTalent offers our W2 consultants excellent benefits such as medical, dental, vision, life insurance, and 401K + matching. We are growing and we want to see you grow!
    ·6790 Views
  • $120000 - $155000 / Year

    Location

    Zivaro Inc 80011, CO, USA

    Type

    Full Time

    Status

    Open

    JOB SUMMARY

    Zivaro is looking for a Principle Cyber/Information Assurance leader to join the Cyber team as the lead Information Systems Security Officer (ISSO) supporting the development, operations and maintenance of custom cyber solutions supporting the Global Positioning System Next Generation Ground Control System (GPS OCX) located at Schriever Space Force Base (SSFB). The Cyber Engineer will collaborate with program managers and team members in Aurora, CO and on-site at SSFB to implement approaches to fully integrate, operate, and maintain cyber operations in support of our customers’ missions located in the Colorado Springs Colorado area.
    The ideal candidate will have a strong cyber experience across the full spectrum of cyber operations from a mission execution perspective; should be knowledgeable about cyber-attack strategies and defensive counter operations; be able to make and defend risk-based decisions and is innovative problem solver. Candidate should have experience with varying network and computer platforms, preferably with background in cyber operations on both embedded and cloud platforms.

    Technical computer/network system auditing of national security information systems and related security requirements (ICD 503, RMF, DIACAP).
    Analyzing audit log data and determine compliance with published standards
    Windows Operating System, Linux, or TCP/IP network troubleshooting abilities
    Knowledge and ability to perform Media Custodian and/or Data Transfer Agent functions



    QUALIFICATIONS

    DoD 8570.01/8140 IAT III certification (CISSP or similar IAT III certification) is mandatory.
    Demonstrated ability to monitor and manage cybersecurity workforce improvement (training, certifications, performance management, etc.).
    Experience in the oversight and execution of a continuous monitoring/improvement program (to include but not limited to supporting security control assessments, ensure user’s training is up to date, log management systems, automated inventory utilities, etc.).
    Experience successfully interfacing with internal and external customers (SCAs, Program Managers, etc.).
    Experience in the execution and management of IS incident response and administrative inquiries/investigations in collaboration with the external support agencies/departments.
    Experience with the identification, development and oversight of appropriate Cybersecurity policy, processes and procedures.
    Ability to deliver program IA Accreditations and coordinate with External Stakeholders (Security Control Assessor / Accreditation Authority)
    Strong understanding of security design and architecture with ability to identify solutions to complex IS compliance and security problems
    Demonstrated vulnerability assessment/remediation experience including the coordination or performance of patch/configuration deployments across multiple platforms
    Demonstrated leadership experience with excellent interpersonal skills
    Excellent written & oral communication skills, including presentation skills
    Active Secret Clearance Required – minimum (TS/SCI is strongly desired)


    DESIRED SKILLS

    Experience with DISA STIGs (Operating Systems, Applications, and Network)
    Experience securing Network Architectures
    Experience onboarding, tuning and implementing enterprise security solutions including: Tenable/Nessus SecurityCenter, and DoD HBSS solution/McAfee ePolicy Orchestrator ePO, SecureVue
    Experience with Agile, Scrum, HW and SW life-cycle management, & engineering change proposal processes
    Experience with two-factor authentication, network surveillance technology, intrusion detection, endpoint protection, data leakage protection, and encryption solutions
    Project skills including cost, schedule, supplier management, risk, and opportunity assessment
    Bachelor’s Degree (BA/BS Engineering, Computer Science, or Math) preferred; or equivalent years of professional experience.
    U.S. Citizenship is required for most positions at Zivaro due to security clearance requirements and government/federal contracts held by Zivaro.

    EEO STATEMENT
    ZIVARO fully subscribes to the principles of Equal Employment Opportunity. It is our policy to provide employment, compensation and other benefits related to employment based on qualifications, without regard to race, color, religion, national origin, age, ***, veteran status, disability, sexual orientation, gender identity or any other basis prohibited by federal, state or local law. In accordance with requirements of the Americans with Disabilities Act, it is our policy to provide reasonable accommodation upon request during the application process to eligible applicants in order that they may be given a full and fair opportunity to be considered for employment. As an Equal Opportunity Employer, we intend to comply fully with applicable federal and state employment laws and the information requested on this application will only be used for purposes consistent with those laws.
    JOB SUMMARY Zivaro is looking for a Principle Cyber/Information Assurance leader to join the Cyber team as the lead Information Systems Security Officer (ISSO) supporting the development, operations and maintenance of custom cyber solutions supporting the Global Positioning System Next Generation Ground Control System (GPS OCX) located at Schriever Space Force Base (SSFB). The Cyber Engineer will collaborate with program managers and team members in Aurora, CO and on-site at SSFB to implement approaches to fully integrate, operate, and maintain cyber operations in support of our customers’ missions located in the Colorado Springs Colorado area. The ideal candidate will have a strong cyber experience across the full spectrum of cyber operations from a mission execution perspective; should be knowledgeable about cyber-attack strategies and defensive counter operations; be able to make and defend risk-based decisions and is innovative problem solver. Candidate should have experience with varying network and computer platforms, preferably with background in cyber operations on both embedded and cloud platforms. Technical computer/network system auditing of national security information systems and related security requirements (ICD 503, RMF, DIACAP). Analyzing audit log data and determine compliance with published standards Windows Operating System, Linux, or TCP/IP network troubleshooting abilities Knowledge and ability to perform Media Custodian and/or Data Transfer Agent functions QUALIFICATIONS DoD 8570.01/8140 IAT III certification (CISSP or similar IAT III certification) is mandatory. Demonstrated ability to monitor and manage cybersecurity workforce improvement (training, certifications, performance management, etc.). Experience in the oversight and execution of a continuous monitoring/improvement program (to include but not limited to supporting security control assessments, ensure user’s training is up to date, log management systems, automated inventory utilities, etc.). Experience successfully interfacing with internal and external customers (SCAs, Program Managers, etc.). Experience in the execution and management of IS incident response and administrative inquiries/investigations in collaboration with the external support agencies/departments. Experience with the identification, development and oversight of appropriate Cybersecurity policy, processes and procedures. Ability to deliver program IA Accreditations and coordinate with External Stakeholders (Security Control Assessor / Accreditation Authority) Strong understanding of security design and architecture with ability to identify solutions to complex IS compliance and security problems Demonstrated vulnerability assessment/remediation experience including the coordination or performance of patch/configuration deployments across multiple platforms Demonstrated leadership experience with excellent interpersonal skills Excellent written & oral communication skills, including presentation skills Active Secret Clearance Required – minimum (TS/SCI is strongly desired) DESIRED SKILLS Experience with DISA STIGs (Operating Systems, Applications, and Network) Experience securing Network Architectures Experience onboarding, tuning and implementing enterprise security solutions including: Tenable/Nessus SecurityCenter, and DoD HBSS solution/McAfee ePolicy Orchestrator ePO, SecureVue Experience with Agile, Scrum, HW and SW life-cycle management, & engineering change proposal processes Experience with two-factor authentication, network surveillance technology, intrusion detection, endpoint protection, data leakage protection, and encryption solutions Project skills including cost, schedule, supplier management, risk, and opportunity assessment Bachelor’s Degree (BA/BS Engineering, Computer Science, or Math) preferred; or equivalent years of professional experience. U.S. Citizenship is required for most positions at Zivaro due to security clearance requirements and government/federal contracts held by Zivaro. EEO STATEMENT ZIVARO fully subscribes to the principles of Equal Employment Opportunity. It is our policy to provide employment, compensation and other benefits related to employment based on qualifications, without regard to race, color, religion, national origin, age, sex, veteran status, disability, sexual orientation, gender identity or any other basis prohibited by federal, state or local law. In accordance with requirements of the Americans with Disabilities Act, it is our policy to provide reasonable accommodation upon request during the application process to eligible applicants in order that they may be given a full and fair opportunity to be considered for employment. As an Equal Opportunity Employer, we intend to comply fully with applicable federal and state employment laws and the information requested on this application will only be used for purposes consistent with those laws.
    ·6124 Views
  • $26 - $29 / Hour

    Location

    Planet Depos San Francisco, CA, USA

    Type

    Full Time

    Status

    Open

    A Digital Court Reporter is required to be present in depositions in which an attorney desires to have the deponent's testimony captured via audio or video. They are responsible for setting up the audio and video equipment and recording the deposition and have an understanding of the digital recording system and its maintenance, upkeep, and operation. Digital Court Reporters are also responsible for taking down notes during the proceedings and creating a log note of speaker identification and keywords, which serve as a general outline of the digital recording.



    DIGITAL COURT REPORTER ESSENTIAL FUNCTIONS:

    Quickly set up audio/video equipment in a professional and tidy manner in new and everchanging environments.
    Accurately position and monitor microphone placement for ideal audio capture.
    Actively and continuously mix multiple audio tracks for proper level and monitor for interference on a portable audio interface.
    Properly set white balance and exposure in various environments.
    Establish and actively monitor appropriate video framing consistent with legal videography norms.
    Assist clients with varying audio, video, and technology issues both in-person and remotely.
    Develop and maintain a high-level understanding of departmental policy, the legal field, and audio and video technology.
    Actively track and log key legal events during legal proceedings, including notating relevant spellings, the introduction of exhibits, and objections.
    Swear in deponents and faithfully capture their spoken testimony under oath during depositions and other legal proceedings.
    Maintain a calm, neutral, and professional demeanor before, during, and after various legal proceedings.


    DIGITAL COURT REPORTER LOCATION:

    San Francisco, CA



    DIGITAL COURT REPORTER SHIFT:

    8:00am - 5:00pm



    DIGITAL COURT REPORTER COMPENSATION:

    $26.00 - $29.00 per hour



    Requirements:

    The ideal candidate will have some experience or knowledge of the legal industry. Must have a 2- or 4-year degree and be comfortable with A/V technologies and digital recording, have a professional appearance, and also experience with dealing face to face with professional clients. You must be able to adapt to unexpected circumstances and operate on a changing schedule, sometimes working after hours. You must have a reliable mode of transportation as well as the ability to lift up to 50lbs.
    A Digital Court Reporter is required to be present in depositions in which an attorney desires to have the deponent's testimony captured via audio or video. They are responsible for setting up the audio and video equipment and recording the deposition and have an understanding of the digital recording system and its maintenance, upkeep, and operation. Digital Court Reporters are also responsible for taking down notes during the proceedings and creating a log note of speaker identification and keywords, which serve as a general outline of the digital recording. DIGITAL COURT REPORTER ESSENTIAL FUNCTIONS: Quickly set up audio/video equipment in a professional and tidy manner in new and everchanging environments. Accurately position and monitor microphone placement for ideal audio capture. Actively and continuously mix multiple audio tracks for proper level and monitor for interference on a portable audio interface. Properly set white balance and exposure in various environments. Establish and actively monitor appropriate video framing consistent with legal videography norms. Assist clients with varying audio, video, and technology issues both in-person and remotely. Develop and maintain a high-level understanding of departmental policy, the legal field, and audio and video technology. Actively track and log key legal events during legal proceedings, including notating relevant spellings, the introduction of exhibits, and objections. Swear in deponents and faithfully capture their spoken testimony under oath during depositions and other legal proceedings. Maintain a calm, neutral, and professional demeanor before, during, and after various legal proceedings. DIGITAL COURT REPORTER LOCATION: San Francisco, CA DIGITAL COURT REPORTER SHIFT: 8:00am - 5:00pm DIGITAL COURT REPORTER COMPENSATION: $26.00 - $29.00 per hour Requirements: The ideal candidate will have some experience or knowledge of the legal industry. Must have a 2- or 4-year degree and be comfortable with A/V technologies and digital recording, have a professional appearance, and also experience with dealing face to face with professional clients. You must be able to adapt to unexpected circumstances and operate on a changing schedule, sometimes working after hours. You must have a reliable mode of transportation as well as the ability to lift up to 50lbs.
    ·4062 Views
  • $90000 - $130000 / Year

    Location

    J.S. Held New York, NY, USA

    Type

    Full Time

    Status

    Open


    The Team and Job Summary

    We are seeking a Senior Associate to join our Blockchain and Cryptocurrency Financial Investigations practice. This is a unique opportunity for an entrepreneurial, highly driven person with a well-rounded skill set to join the JS Held team. The ideal person for this role will need to not only have a strong grasp of investigations, but also be a flexible and a strategic thinker able to take on a variety of tasks. Specifically, we are looking to add an individual who has a developed understanding of blockchain and cryptocurrency. This role will not only be investigatory in nature but will encompass many of the financial crime related elements that the cryptocurrency industry is experiencing.



    Job Responsibilities

    Utilize knowledge of databases and programming languages to analyze and interpret data, including historical financial, operational, and transactional data
    Identify, research, and organize information to assess the quality of data to facilitate effective analysis, identifying any potentially sensitive content
    Execute projects involving the identification, collection, processing, review, and production of electronic data relevant to security and regulatory investigations
    Create, prepare, and validate analyses, reports, presentations, and other deliverables regarding project scope and results of work performed
    Participate in client meetings to review results of work performed
    Responsible for management of day-to-day project activities, including interaction with other team members, professionals from other firms, and client staff
    Ability to understand, analyze, and trace cryptocurrency transactions
    Required Qualifications



    BA/BS or MA/MS in Computer Science, Cyber Security, MIS, Business Analytics, or another relevant field
    Strong background in the analysis of accounting, finance, insurance, manufacturing and other real world transactional data sets
    3+ years of experience working in a consulting firm or similar environment
    High level of proficiency in Python, Java, C or equivalent
    Proficiency in SQL. Experience with both traditional and cloud-based database servers


    Preferred Qualifications



    Someone who is naturally curious, listens carefully and motived to begin the problem-solving process once you have the information you need.
    Possess strong quantitative and qualitative research and analytical skills.
    Able to adapt quickly.
    Relevant experience in blockchain and cryptocurrency is preferred.
    Programming skills are a plus: Python, R, SQL, Solidity, Go, Rust.
    Outstanding at written and speaking skills; must be able to create status reports, write official reports, forensic reports, and demonstrate an ability to convey the complexity of blockchain and cryptocurrency in easy-to-understand ways.
    Well-developed analytical skills and the ability to provide clarity to complex issues and synthesize large amounts of information.
    Experience with Blockchain analytics platforms, including TRM Labs, or equivalent.
    Certified Bitcoin Professional or Cryptocurrency Investigator preferred.


    Physical and Mental Job Qualifications

    Our mission is to serve as trusted, expert advisors to organizations around the world facing high-stakes situations that demand urgent attention, exceptional knowledge, staunch integrity and objective, clear- cut analysis and advice.



    Some of the Benefits We Have Include

    J.S. Held understands all our employees are people and sometimes life needs flexibility. We work to always provide an environment that best supports and suits our team’s needs.

    Our flexible work environment allows employees to work remotely, when needed
    Generous PTO Policy
    Medical, Dental, and Vision Insurance
    401k Match
    Commuter Benefits


    A reasonable estimate of the salary range for this role is $90,000 - $130,000. Any offered salary range is based on a wide array of factors including but not limited to skillset, experience, training, location, scope of role, management responsibility, etc.


    Other Duties

    Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

    By submitting your application, you acknowledge that you have read the J.S. Held Online Privacy Notice and hereby freely and unambiguously give informed consent to the collection, processing, use, and storage of your personal information as required and described therein.

    Please explore what we’re all about at www.jsheld.com.



    EEO and Job Accommodations

    We embrace diversity and our commitment to building a team and environment that fosters professional and personal enrichment is unwavering. We are greater when we are equal!
    The Team and Job Summary We are seeking a Senior Associate to join our Blockchain and Cryptocurrency Financial Investigations practice. This is a unique opportunity for an entrepreneurial, highly driven person with a well-rounded skill set to join the JS Held team. The ideal person for this role will need to not only have a strong grasp of investigations, but also be a flexible and a strategic thinker able to take on a variety of tasks. Specifically, we are looking to add an individual who has a developed understanding of blockchain and cryptocurrency. This role will not only be investigatory in nature but will encompass many of the financial crime related elements that the cryptocurrency industry is experiencing. Job Responsibilities Utilize knowledge of databases and programming languages to analyze and interpret data, including historical financial, operational, and transactional data Identify, research, and organize information to assess the quality of data to facilitate effective analysis, identifying any potentially sensitive content Execute projects involving the identification, collection, processing, review, and production of electronic data relevant to security and regulatory investigations Create, prepare, and validate analyses, reports, presentations, and other deliverables regarding project scope and results of work performed Participate in client meetings to review results of work performed Responsible for management of day-to-day project activities, including interaction with other team members, professionals from other firms, and client staff Ability to understand, analyze, and trace cryptocurrency transactions Required Qualifications BA/BS or MA/MS in Computer Science, Cyber Security, MIS, Business Analytics, or another relevant field Strong background in the analysis of accounting, finance, insurance, manufacturing and other real world transactional data sets 3+ years of experience working in a consulting firm or similar environment High level of proficiency in Python, Java, C or equivalent Proficiency in SQL. Experience with both traditional and cloud-based database servers Preferred Qualifications Someone who is naturally curious, listens carefully and motived to begin the problem-solving process once you have the information you need. Possess strong quantitative and qualitative research and analytical skills. Able to adapt quickly. Relevant experience in blockchain and cryptocurrency is preferred. Programming skills are a plus: Python, R, SQL, Solidity, Go, Rust. Outstanding at written and speaking skills; must be able to create status reports, write official reports, forensic reports, and demonstrate an ability to convey the complexity of blockchain and cryptocurrency in easy-to-understand ways. Well-developed analytical skills and the ability to provide clarity to complex issues and synthesize large amounts of information. Experience with Blockchain analytics platforms, including TRM Labs, or equivalent. Certified Bitcoin Professional or Cryptocurrency Investigator preferred. Physical and Mental Job Qualifications Our mission is to serve as trusted, expert advisors to organizations around the world facing high-stakes situations that demand urgent attention, exceptional knowledge, staunch integrity and objective, clear- cut analysis and advice. Some of the Benefits We Have Include J.S. Held understands all our employees are people and sometimes life needs flexibility. We work to always provide an environment that best supports and suits our team’s needs. Our flexible work environment allows employees to work remotely, when needed Generous PTO Policy Medical, Dental, and Vision Insurance 401k Match Commuter Benefits A reasonable estimate of the salary range for this role is $90,000 - $130,000. Any offered salary range is based on a wide array of factors including but not limited to skillset, experience, training, location, scope of role, management responsibility, etc. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. By submitting your application, you acknowledge that you have read the J.S. Held Online Privacy Notice and hereby freely and unambiguously give informed consent to the collection, processing, use, and storage of your personal information as required and described therein. Please explore what we’re all about at www.jsheld.com. EEO and Job Accommodations We embrace diversity and our commitment to building a team and environment that fosters professional and personal enrichment is unwavering. We are greater when we are equal!
    ·3948 Views
  • $800 - $1000 / Month

    Location

    Creed and Bear

    Type

    Full Time

    Status

    Open

    About the Job
    Reverse engineer malware samples in order to characterize their attributes for identification, correlate indicator information to identify larger attack architectures and topologies, and create proof of concept software to assist in real-time analysis and tracking of targeted malware families.

    • Conduct vulnerability analysis of complex and diverse software systems and network architectures.

    • Identify anti-analysis techniques, including encryption, obfuscation, virtual machine detection, and conditional coding for the purpose of identifying tactics, techniques, and procedures used by malware authors.

    • Provide subject matter expertise on cyber threats, attacks, and incidents of interests to PhishLabs and our customers as well as knowledge of typical attack vectors, network exploitation techniques, and exfiltration channels.

    • Monitor underground marketplace activity for any new threats being distributed or discussed by cyber actors.



    Reverse Engineer Required Skills



    • Advanced understanding of Windows and Linux based operating systems as well as the iOS and Android Platforms.

    • A Bachelor’s or Master’s degree in Computer Science, Information Systems, or other computer related field.

    • Demonstrable experience working with open-source and commercial analysis tools for the purposes of malware reverse engineering including, but not limited to, decompilers, disassemblers, debuggers, systems internals utilities, and network traffic analysis tools.

    • Experience with enterprise level sandbox tools and familiarity of edge and endpoint protection systems.

    • Experience programming in a scripting language, such as Python, as well as working knowledge of x86, x64, and ARM assembly instructions, C, C++, Java, JavaScript, PHP and HTML.

    • Proven ability to analyze and reverse engineer packed or obfuscated code, develop code to monitor botnets, and reverse engineer custom protocols.

    • Advanced understanding of operating system internals and Windows API.

    • Experience with both SQL and NoSQL data storage solutions as well as ElasticSearch search and analytics engine to include data implementation and design.

    • Experience with security data characterization standards such as STIX, MAEC, TAXII, CybOx.

    • Experience with networking, network protocols, and security infrastructures.

    • Experience with financially-incentived malware such as banking trojans is preferred.

    • Experience with creation and maintenance of rules to detect malicious activity or code (yara, snort, suricate, etc.)


    Skills

    STIX, MAEC, TAXII, CybOx.

    Compensation

    1 usd/ month
    About the Job Reverse engineer malware samples in order to characterize their attributes for identification, correlate indicator information to identify larger attack architectures and topologies, and create proof of concept software to assist in real-time analysis and tracking of targeted malware families. • Conduct vulnerability analysis of complex and diverse software systems and network architectures. • Identify anti-analysis techniques, including encryption, obfuscation, virtual machine detection, and conditional coding for the purpose of identifying tactics, techniques, and procedures used by malware authors. • Provide subject matter expertise on cyber threats, attacks, and incidents of interests to PhishLabs and our customers as well as knowledge of typical attack vectors, network exploitation techniques, and exfiltration channels. • Monitor underground marketplace activity for any new threats being distributed or discussed by cyber actors. Reverse Engineer Required Skills • Advanced understanding of Windows and Linux based operating systems as well as the iOS and Android Platforms. • A Bachelor’s or Master’s degree in Computer Science, Information Systems, or other computer related field. • Demonstrable experience working with open-source and commercial analysis tools for the purposes of malware reverse engineering including, but not limited to, decompilers, disassemblers, debuggers, systems internals utilities, and network traffic analysis tools. • Experience with enterprise level sandbox tools and familiarity of edge and endpoint protection systems. • Experience programming in a scripting language, such as Python, as well as working knowledge of x86, x64, and ARM assembly instructions, C, C++, Java, JavaScript, PHP and HTML. • Proven ability to analyze and reverse engineer packed or obfuscated code, develop code to monitor botnets, and reverse engineer custom protocols. • Advanced understanding of operating system internals and Windows API. • Experience with both SQL and NoSQL data storage solutions as well as ElasticSearch search and analytics engine to include data implementation and design. • Experience with security data characterization standards such as STIX, MAEC, TAXII, CybOx. • Experience with networking, network protocols, and security infrastructures. • Experience with financially-incentived malware such as banking trojans is preferred. • Experience with creation and maintenance of rules to detect malicious activity or code (yara, snort, suricate, etc.) Skills STIX, MAEC, TAXII, CybOx. Compensation 1 usd/ month
    Like
    Love
    4
    2 Comments ·5738 Views