Jobs
Interviews

3 Magnet Axiom Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 3.0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Job Description Role: Digital Forensics Technician Location: Bangalore Full/ Part-time: Full Time Build a career with confidence Carrier Global Corporation, global leader in intelligent climate and energy solutions is committed to creating solutions that matter for people and our planet for generations to come. From the beginning, we&aposve led in inventing new technologies and entirely new industries. Today, we continue to lead because we have a world-class, diverse workforce that puts the customer at the center of everything we do. About The Role As a Digital Forensics Technician, you will play a pivotal role in conducting forensic investigations, preserving digital evidence, and supporting legal and compliance initiatives.You will work closely with cybersecurity professionals, legal teams, and internal stakeholders to ensure the confidentiality, integrity, and availability of digital evidence. This role offers a unique opportunity to grow your technical expertise while directly contributing to enterprise risk reduction and legal readiness. Work is performed under supervision. Key Responsibilities Conduct forensic analysis of digital media including hard drives, mobile devices, thumb drives, and cloud environments using industry-standard tools such as EnCase and Magnet AXIOM. Collect and preserve digital evidence in a forensically sound manner, both remotely and on-site, ensuring proper chain of custody and documentation. Support incident response and litigation by imaging, analyzing, and reporting on digital evidence in a timely and confidential manner. Execute and track legal hold requests in alignment with legal and regulatory requirements. Create detailed forensic reports and summaries to support internal investigations, HR, legal, and compliance teams. Maintain and test forensic tools, lab environments, licenses, and evidence management systems. Collaborate with stakeholders including the CISO, Internal Audit, Compliance, and Legal to address technical issues involving sensitive data and fraud investigations. Communicate technical findings to both technical and non-technical audiences, with an understanding of potential legal implications. Stay current with trends, tools, and best practices in digital forensics and federal court evidence requirements. Contribute to the development and refinement of standard operating procedures and forensic readiness initiatives. Requirements Bachelors degree in Digital Forensics, Cybersecurity, Computer Science, or a related field. 1+ years of experience in digital forensics, cybersecurity, or IT operations. Preferred Qualifications Familiarity with standard operating systems (Windows/Linux), file systems, and network fundamentals. Strong analytical, investigative, and organizational skills. Excellent written and verbal communication skills. Proficiency with Microsoft Office tools (Excel, Word, PowerPoint). Ability to multitask and deliver high-quality, detail-oriented work in a fast-paced environment. Hands-on experience with forensic tools such as EnCase, Magnet AXIOM. Understanding of forensic principles, evidence preservation, and legal chain of custody. Experience supporting enterprise-level incident response and internal investigations. Familiarity with e-discovery workflows, legal hold processes, and corporate litigation support. Professional certifications such as EnCE, GCFA, GCFE, CFCE, or CCE. Experience with expert witness testimony or legal proceedings is a plus. Benefits We are committed to offering competitive benefits programs for all of our employees, and enhancing our programs when necessary. Make yourself a priority with flexible schedules, parental leave Drive forward your career through professional development opportunities Achieve your personal goals with our Employee Assistance Program. Our commitment to you Our greatest assets are the expertise, creativity and passion of our employees. We strive to provide a great place to work that attracts, develops and retains the best talent, promotes employee engagement, fosters teamwork and ultimately drives innovation for the benefit of our customers. We strive to create an environment where you feel that you belong, with diversity and inclusion as the engine to growth and innovation. We develop and deploy best-in-class programs and practices, providing enriching career opportunities, listening to employee feedback and always challenging ourselves to do better. This is The Carrier Way. Join us and make a difference. Apply Now! Carrier is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class. Job Applicant&aposs Privacy Notice Click on this link to read the Job Applicant&aposs Privacy Notice Show more Show less

Posted 3 days ago

Apply

5.0 - 14.0 years

0 Lacs

ahmedabad, gujarat

On-site

As a seasoned Cybersecurity professional in a leadership role, you will be responsible for overseeing various aspects of Digital Forensics and Incident Response (DFIR) across Operational Technology/Industrial Control Systems (OT/ICS) and Information Technology (IT) environments. Your primary duties will involve conducting forensic investigations and root cause analyses of cyber incidents, coordinating incident response activities, and ensuring compliance with breach containment and recovery protocols. You will play a crucial role in the development and maintenance of playbooks, Standard Operating Procedures (SOPs), and readiness frameworks for both proactive and reactive DFIR measures. Additionally, you will be tasked with establishing and managing forensic labs and tooling infrastructure to support memory, disk, network, and cloud forensics. Collaborating with client Chief Information Security Officer (CISO) teams and legal/compliance counterparts during forensic escalations will also be a key aspect of your role. As a mentor and leader, you will guide junior investigators, ensuring their skill development through hands-on training. Your expertise will drive continuous improvement initiatives in forensic collection, chain of custody, and evidence handling procedures. Furthermore, you will be expected to provide support for expert testimony, litigation response, and legal documentation as needed. Your role will require close collaboration with red, blue, and purple teams to develop an integrated threat mitigation strategy. You will also conduct forensic workshops, table-top exercises, and readiness assessments for clients. Building relationships with global Original Equipment Manufacturers (OEMs) and DFIR product partners to enhance capabilities will be essential for the success of the organization. In terms of required skills and tools, you should be proficient in utilizing tools such as EnCase, FTK, Magnet AXIOM, Autopsy, Volatility, and Wireshark. Experience with Endpoint Detection and Response (EDR)/Extended Detection and Response (XDR) platforms like CrowdStrike, SentinelOne, and Carbon Black is crucial. Familiarity with OT forensic challenges, including air-gapped ICS/SCADA systems, and a deep understanding of ICS protocols such as Modbus, DNP3, and OPC-UA are also expected. Your personality traits and leadership abilities will be put to the test in this role. Strong analytical skills, attention to detail, and strategic thinking will be essential, especially in high-pressure situations. Your proven ability to lead in crisis scenarios, communicate effectively with stakeholders, and manage teams will be highly valued. Collaborating seamlessly with cross-functional teams, including Security Operations Center (SOC), engineering, legal, and client teams, will be instrumental in achieving the organization's cybersecurity goals. To qualify for this position, you should hold a Bachelor's or Master's degree in Cybersecurity, Computer Science, or related fields. Preferred certifications include GCFA, GCFE, CHFI, CISSP, or their equivalents. A minimum of 14 years of cybersecurity experience, with at least 5 years in DFIR leadership roles, and prior experience managing DFIR services for critical infrastructure or consulting environments are prerequisites for this role.,

Posted 1 week ago

Apply

3.0 - 8.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Qualifications & Experience: Minimum of 2 years of hands-on experience in digital forensics, cybercrime investigations, or related technical fields. Exposure across both public and private sectors is preferred. Proven expertise in identifying, containing, mitigating, and recovering from cybersecurity incidents, with strong post-incident reporting capabilities. Demonstrated ability to independently develop and continuously improve skills in Digital Forensics, DFIR methodologies, and evolving cybersecurity trends. In-depth knowledge of forensic best practices, industry standards, and investigative methodologies for both host-based and network-level analysis. Proficient in the forensic preservation of digital evidence across a variety of platforms in a forensically sound and defensible manner. Familiarity with internationally recognized digital evidence acquisition and handling standards (e.g., NIST, ISO 27037). Hands-on experience with forensic tools and techniques supporting internal investigations, such as employee misconduct or data exfiltration cases. Experience serving as an escalation point for suspected security incidents or intrusions, including initial triage and scoping. Proficient with endpoint detection and response (EDR) tools and live forensics techniques. Practical knowledge of forensic analysis on multiple operating systems: Windows, macOS, and Linux. Strong command of DFIR-related open-source tools, memory analysis, and full-disk forensics. Capable of leading or participating in large-scale forensic investigations both independently and as part of a team. Skilled in performing root cause analysis and post-incident forensic reviews for cyber events and security breaches. Proven ability to prepare comprehensive investigation reports, breach summaries, and documentation for privacy and data exposure incidents. Exceptional attention to detail and ability to maintain thorough and accurate investigative records and chain-of-custody documentation. Preferred Certifications (one or more): CHFI (Computer Hacking Forensic Investigator) CIH (Certified Incident Handler) CSA (Certified SOC Analyst) CEH (Certified Ethical Hacker) GSEC (GIAC Security Essentials) GCIH (GIAC Certified Incident Handler) GCIA (GIAC Certified Intrusion Analyst) GCFE (GIAC Certified Forensic Examiner) GREM (GIAC Reverse Engineering Malware) GCFA (GIAC Certified Forensic Analyst)

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies