Jobs
Interviews

8 Ftk Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 12.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

JOB TITLE: Associate Director, Forensics JOB CODE: P19 Summary The Associate Director of Forensics manages and oversees all aspects of the Digital Forensics Incident Response (DFIR) engagements for multiple Tiger Teams, including the Tiger Teams performance, execution, delivery, quality control, and client development. Operating as an industry leader in Digital Forensics Incident Response, and a trusted advisor to the client and breach coach, the Forensic Associate Director helps to ensure 100% client success. The Associate Director, Forensics will provide breach coaches and Insurance Carriers with tailored detailed analysis through a narrative and story with reports summarizing how the unauthorized actor obtained access and identifying the potential root cause of the cyber intrusion. ROLES & RESPOSIBILITIES Provides forensic data and artifact collection requests needed for the forensic analysis and ensures the data is collected, delivered, and processed following the project timelines and deliverables Responsible for shadowing on scoping calls they are assigned to by the teams IR Ops Associated Responsible for listening to the scoping call to have situational awareness and case background from the start of every engagement, so they can drive the forensic investigation forward ensuring the right data is collected and analysis questions answered Supporting the Director, as a Forensic SME for all active forensic analysis for projects on their assigned Tiger Teams Responsible for maintaining target utilization for the assigned Tiger Teams from client billable work including forensic analysis, participating in client update or forensic scoping and update findings calls, client correspondence related to forensic analysis, data collection, or investigative questions verbally or in writing Manages and oversees the forensic data collection process in support of the forensic investigation for the assigned engagement Ensures the forensic project timeline is on track, daily updates are provided from the assigned Tiger Teams, and Analyst SLAs are met (i.e., report is delivered on time, interim and final updates are provided on time when asked) Ensures the Tiger Teams and assigned analysts have the data, context, and clarity they need to conduct accurate and timely analysis Participate in client-facing calls when needed to support Tiger Teams and provide forensic updates as needed to ensure accurate findings are conveyed as they relate to the investigation Communicating both verbally and in writing to answer client and counsel questions related to the forensic investigation Oversee the delivery of the Tiger Teams and forensics pool while providing technical reviews and quality control for updates and reports Support the Tiger Team with delegating and managing the Tiger Team including the Senior Analysts and Analysts on their respective Tiger Team Conducts the performance reviews of all forensic analysts on their respective Tiger Teams Maintain a minimum caseload of at least three cases for which they will lead and deliver forensic analysis updates with the Tiger Team. The caseload will be maintained alongside the Forensic Associate Directors other responsibilities and duties Conducts final review of the report from the perspective of the forensic investigator ensuring all possible investigative questions were addressed in the analysis and requesting additional context or analysis when the report requires more work May perform other duties as assigned by management Role Accountabilities Squad Management Manage cadence and team delivery through routine team meetings Review and assess team performance through the measurement of KPIs Develop consistency between pods through the execution of playbooks and consistent training for new hires Project Leadership Ensure projects stay within scope, schedule, and budget Manage project communications, negotiations, and solutions Address client feedback as directed by Sr. Leadership Performance Management Hold individuals accountable for following the playbooks Inspire individuals to achieve results measured by defined metrics Be open to new ideas and ensure best practices are implemented Process Oversight Ensure adherence to business processes to ensure operational efficiency and help identify infrastructure requirements to meet the business needs Track lessons learned from previous projects and ensure playbooks and training materials are reviewed & updated regularly Team Utilization Manage project assignments and hand off processes Ensure the team follows and upholds standardized process Quality Assurance / Client Satisfaction Ensure client satisfaction among internal and external stakeholders Responsible for creating and updating metrics indicating client satisfaction among internal and external stakeholders Project Execution / Delegation Provide oversight of client satisfaction among internal and external stakeholders Monitor and report metrics indicating client satisfaction among internal and external stakeholders Support the development of strategic partnerships to maintain profitable and long- lasting relationships with key clients Job Requirements Must have 10+ years of incident response or digital forensics experience with a passion for cyber security (consulting experience preferred) Proficient with host-based forensics, network forensics, malware analysis and data breach response Experienced with EnCase, Axiom, X-Ways, FTK, SIFT, ELK, Redline, Volatility, and open-source forensic tools Experience with a common scripting or programming language, including Perl, Python, Bash, or PowerShell Experience managing and mentoring forensic teams, preferably in a security, incident response or professional services consulting firm A deep understanding of working with legal counsel and the ability to thrive in a fast-paced environment, experience working with and communicating with C-level executives, attorneys, and insurance carriers DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job. TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete&aposs salary and benefit policy. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY Were proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete Youll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but were about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity Were proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. Show more Show less

Posted 22 hours ago

Apply

5.0 - 14.0 years

0 Lacs

ahmedabad, gujarat

On-site

As a seasoned Cybersecurity professional in a leadership role, you will be responsible for overseeing various aspects of Digital Forensics and Incident Response (DFIR) across Operational Technology/Industrial Control Systems (OT/ICS) and Information Technology (IT) environments. Your primary duties will involve conducting forensic investigations and root cause analyses of cyber incidents, coordinating incident response activities, and ensuring compliance with breach containment and recovery protocols. You will play a crucial role in the development and maintenance of playbooks, Standard Operating Procedures (SOPs), and readiness frameworks for both proactive and reactive DFIR measures. Additionally, you will be tasked with establishing and managing forensic labs and tooling infrastructure to support memory, disk, network, and cloud forensics. Collaborating with client Chief Information Security Officer (CISO) teams and legal/compliance counterparts during forensic escalations will also be a key aspect of your role. As a mentor and leader, you will guide junior investigators, ensuring their skill development through hands-on training. Your expertise will drive continuous improvement initiatives in forensic collection, chain of custody, and evidence handling procedures. Furthermore, you will be expected to provide support for expert testimony, litigation response, and legal documentation as needed. Your role will require close collaboration with red, blue, and purple teams to develop an integrated threat mitigation strategy. You will also conduct forensic workshops, table-top exercises, and readiness assessments for clients. Building relationships with global Original Equipment Manufacturers (OEMs) and DFIR product partners to enhance capabilities will be essential for the success of the organization. In terms of required skills and tools, you should be proficient in utilizing tools such as EnCase, FTK, Magnet AXIOM, Autopsy, Volatility, and Wireshark. Experience with Endpoint Detection and Response (EDR)/Extended Detection and Response (XDR) platforms like CrowdStrike, SentinelOne, and Carbon Black is crucial. Familiarity with OT forensic challenges, including air-gapped ICS/SCADA systems, and a deep understanding of ICS protocols such as Modbus, DNP3, and OPC-UA are also expected. Your personality traits and leadership abilities will be put to the test in this role. Strong analytical skills, attention to detail, and strategic thinking will be essential, especially in high-pressure situations. Your proven ability to lead in crisis scenarios, communicate effectively with stakeholders, and manage teams will be highly valued. Collaborating seamlessly with cross-functional teams, including Security Operations Center (SOC), engineering, legal, and client teams, will be instrumental in achieving the organization's cybersecurity goals. To qualify for this position, you should hold a Bachelor's or Master's degree in Cybersecurity, Computer Science, or related fields. Preferred certifications include GCFA, GCFE, CHFI, CISSP, or their equivalents. A minimum of 14 years of cybersecurity experience, with at least 5 years in DFIR leadership roles, and prior experience managing DFIR services for critical infrastructure or consulting environments are prerequisites for this role.,

Posted 6 days ago

Apply

10.0 - 20.0 years

45 - 50 Lacs

Bengaluru

Hybrid

Job Description: We are seeking an experienced Cyber Security Operations and GRC Manager to join our team at, a leader in blockchain technology and solutions. The ideal candidate will be Responsible for safeguarding an organizations information technology infrastructure and data from potential threats, vulnerabilities, and cyberattacks Develop and implement comprehensive security strategies and policies to protect the organization’s assets and data Design, configure, and deploy security infrastructure components such as firewalls, intrusion detection/prevention systems (IDS/IPS), secure access controls, encryption mechanisms, and security information and event management (SIEM) solutions Proactively conduct regular risk assessments and vulnerability analysis, Security Audits to identify potential security threats and weaknesses Review vulnerability assessments, penetration testing reports, and security audits to identify weaknesses and vulnerabilities in IT systems and applications Work closely with GRC team, review and implement corrective actions for GRC recommendation, audit observations and non-conformances. Additional Responsibilities: Threat Monitoring & Detection: Continuously monitor security alerts and events across all systems using SIEM tools and other monitoring platforms. Identify, analyze, and respond to security threats in real-time. Incident Response: Lead Incident Response team Vulnerability Management: Regularly assess and prioritize vulnerabilities, patch systems, and work with IT teams to implement secure configurations and updates. Security Tool Management: Configure, maintain, and optimize security tools, including firewalls, intrusion detection/prevention systems, antivirus software, and endpoint protection. Forensics & Analysis: Conduct forensic investigations to collect, analyze, and preserve evidence related to security incidents. Security Reporting & Documentation: Review reports on security incidents, vulnerabilities, and performance of security systems. Requirements: Educational Background: Bachelor’s degree in Computer Science, CyberSecurity, or a related field. Experience: Minimum of 10-20 years of experience in security operations, GRC Solid understanding of threat intelligence and incident handling frameworks (e.g., MITRE ATT&CK, NIST). Proficiency with SIEM tools (e.g., Splunk, QRadar, LogRhythm) and other security monitoring solutions. Strong knowledge of networking protocols, firewall management, and intrusion detection/prevention systems. Experience with scripting languages (e.g., Python, PowerShell) for automation of tasks. Familiarity with forensic tools and methodologies (e.g., EnCase, FTK). Soft Skills: Strong problem-solving abilities, attention to detail, effective communication skills, ability to work under pressure, and a collaborative mindset. Preferred Qualifications: Security certifications such as CEH, GCIH, GCIA, or CISSP. Experience with cloud security (e.g., AWS, Azure, GCP) and securing cloud environments. Knowledge of regulatory and compliance requirements (e.g., PCI-DSS, GDPR).

Posted 1 month ago

Apply

5.0 - 10.0 years

9 - 14 Lacs

Kolkata

Work from Office

Date 10 Jun 2025 Location: Kokata, WB, IN Company Astom At Astom, we understand transport networks and what moves peope. From high-speed trains, metros, monorais, and trams, to turnkey systems, services, infrastructure, signaing and digita mobiity, we offer our diverse customers the broadest portfoio in the industry. Every day, 80,000 coeagues ead the way to greener and smarter mobiity wordwide, connecting cities as we reduce carbon and repace cars. Coud you be the fu-time Weding Expert in Kokata were ooking for Your future roe Take on a new chaenge and appy your comprehensive weding process expertise in a new cutting-edge fied. You work aongside dedicated, innovative, and coaborative teammates. You' contribute to the exceence of our manufacturing process by ensuring the highest weding standards from tender to warranty phases. Day-to-day, you coaborate with teams across the business (Tech. Bid, Product Eng., Industria Quaity, etc.), oversee the preparation of wed pans, and much more. You specificay take care of the performance and assessment of Weding Procedure Quaification, but aso ensure the compatibiity and handing of weding consumabes & parent materias. We ook to you for: Participation in technica reviews and wed sequence definitions Conducting suppier audits and ensuring equipment suitabiity Aocation of quaified weders and preparation of wed pans Visua inspection before, during, and after weding Supporting the reduction of defects through root cause anaysis Ensuring compiance with heath, safety, and environmenta standards A about you We vaue passion and attitude over experience. Thats why we dont expect you to have every singe ski. Instead, weve isted some that we think wi hep you succeed and grow in this roe: Degree in Engineering (BE/B.Tech) or an IWE certification Experience or understanding of heavy meta weding in industries such as ocomotive or automotive Knowedge of internationa weding standards and technoogica advancements Famiiarity with MS Office toos (Word, Exce, PowerPoint) Proficiency in the Engish anguage Abiity to train engineers and weders A coaborative mindset with a goba vision Things you enjoy Join us on a ife-ong transformative journey the rai industry is here to stay, so you can grow and deveop new skis and experiences throughout your career. You aso: Enjoy stabiity, chaenges and a ong-term career free from boring daiy routines Work with the atest standards for rai weding quaity and safety Coaborate with transverse teams and hepfu coeagues Contribute to innovative projects that impact goba mobiity Utiise our fexibe working environment Steer your career in whatever direction you choose across functions and countries Benefit from our investment in your deveopment, through award-winning earning Progress towards eadership and advanced technica roes Benefit from a fair and dynamic reward package that recognises your performance and potentia, pus comprehensive and competitive socia coverage (ife, medica, pension) You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or famiy, you be proud. If youre up for the chaenge, wed ove to hear from you! Important to note As a goba business, were an equa-opportunity empoyer that ceebrates diversity across the 63 countries we operate in. Were committed to creating an incusive workpace for everyone.

Posted 1 month ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are seeking a Cybersecurity Analyst to detect, investigate, and prevent security threats across digital assets and systems. Key Responsibilities: Monitor and analyze security alerts, logs, and events. Perform threat intelligence, malware analysis, and incident response. Conduct vulnerability assessments and patch management. Support compliance and audit activities (ISO, NIST, GDPR). Educate staff on cybersecurity best practices and awareness. Required Skills & Qualifications: Experience with SIEM tools (Splunk, AlienVault, QRadar). Knowledge of firewalls, IDS/IPS, endpoint protection, and antivirus. Familiarity with scripting for automation and reporting. Strong analytical, investigative, and communication skills. Security certifications preferred (e.g., CompTIA Security+, SOC Analyst, CISSP). Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 1 month ago

Apply

0.0 - 1.0 years

0 - 0 Lacs

Bengaluru

Work from Office

Assist in document verification, fingerprint analysis, and digital evidence collection. Support forensic investigations across physical and cyber domains with proper documentation. Stay updated on forensic tools, techniques, and legal standards. Performance bonus Retention bonus

Posted 1 month ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 1 month ago

Apply

3.0 - 8.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Qualifications & Experience: Minimum of 2 years of hands-on experience in digital forensics, cybercrime investigations, or related technical fields. Exposure across both public and private sectors is preferred. Proven expertise in identifying, containing, mitigating, and recovering from cybersecurity incidents, with strong post-incident reporting capabilities. Demonstrated ability to independently develop and continuously improve skills in Digital Forensics, DFIR methodologies, and evolving cybersecurity trends. In-depth knowledge of forensic best practices, industry standards, and investigative methodologies for both host-based and network-level analysis. Proficient in the forensic preservation of digital evidence across a variety of platforms in a forensically sound and defensible manner. Familiarity with internationally recognized digital evidence acquisition and handling standards (e.g., NIST, ISO 27037). Hands-on experience with forensic tools and techniques supporting internal investigations, such as employee misconduct or data exfiltration cases. Experience serving as an escalation point for suspected security incidents or intrusions, including initial triage and scoping. Proficient with endpoint detection and response (EDR) tools and live forensics techniques. Practical knowledge of forensic analysis on multiple operating systems: Windows, macOS, and Linux. Strong command of DFIR-related open-source tools, memory analysis, and full-disk forensics. Capable of leading or participating in large-scale forensic investigations both independently and as part of a team. Skilled in performing root cause analysis and post-incident forensic reviews for cyber events and security breaches. Proven ability to prepare comprehensive investigation reports, breach summaries, and documentation for privacy and data exposure incidents. Exceptional attention to detail and ability to maintain thorough and accurate investigative records and chain-of-custody documentation. Preferred Certifications (one or more): CHFI (Computer Hacking Forensic Investigator) CIH (Certified Incident Handler) CSA (Certified SOC Analyst) CEH (Certified Ethical Hacker) GSEC (GIAC Security Essentials) GCIH (GIAC Certified Incident Handler) GCIA (GIAC Certified Intrusion Analyst) GCFE (GIAC Certified Forensic Examiner) GREM (GIAC Reverse Engineering Malware) GCFA (GIAC Certified Forensic Analyst)

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies