Forensic Investigator
6 days ago
**Why work with us**
At TDG, the word digital does not merely translate to technology, but it signifies something far more revolutionary and life-changing. As a leading Pan-Asian start-up, we have prime leaders and experts across industries that seek to enhance you professionally and we can grow together as a company. Accompanied by creative, technical and data-minded specialists, we believe TDG is a unique working experience at the epicenter of digital innovation.
**What you will be doing**
The Digital Forensic Investigator is responsible for collecting and investigating digital forensics artifacts to assist investigations and/or perform evidence management. When investigating, they focus on the forensics capture and analysis of media and network artifacts to reconstruct timelines associated with an identified attack or breach.
**Key Responsibilities**:
- Analyzing requests, and planning and executing forensic support for both simple and complex investigations.
- Providing recommendations for identification, collection and preservation of digital evidence.
- Determining tools and procedures required for preservation.
- Collecting, processing and analyzing electronically stored information (ESI) obtained from network, cloud and end user digital sources in accordance with industry standards.
- Providing required documentation demonstrating chain of custody of evidence.
- Generating formal forensic analysis reports in a clear and concise manner to a non-technical audience, e.g. senior management.
- Working with other team members to provide guidance and assistance.
- Using industry standard digital forensic tools (e.g. FTK, Axiom) during the course of investigation.
- Conducting research into project-related issues.
- Maintaining forensic credentials and ability to provide expert testimony.
**What we are looking for**
- Bachelor degree in a related field such as information security, management or computer engineering.
- Experience in digital forensics.
- Active CISSP, CISM and CCE or similar certifications are required.
- Other relevant certifications (such as GCIH, GCIA) are desirable.
- Strong attention to detail, concern for data accuracy and high personal integrity.
- In depth experience with industry standard digital forensics methodologies, including: evidence handling, chain of custody procedures, and commonly used forensic toolsets.
- Experience using physical, local and remote acquisition tools across multiple OS systems.
- Ability to clearly document and communicate findings, opinions, and recommendations to both technical and non-technical audiences.
-
Scg
2 hours ago
Thailand NodeFlair Full time**Job Summary**: **Job Type** Permanent **Seniority** Mid **Years of Experience** At least 3 years - Responsibilities: - Monitoring to detect anomalies, manage security operation to identify risks/improvement opportunity. - Coordinate with vendors/BU to perform investigation, collect forensics evidences, analyze potential and determine the root cause. -...
-
Cyber Crime Crypto Analyst
2 days ago
Thailand CertiK Full time**About the Company** One of the fastest-growing and most trusted companies in blockchain security, CertiK is a true market leader. To date, CertiK has worked with over 3,200 Enterprise clients, secured over $310 billion worth of digital assets, and has detected over 60,000 vulnerabilities in blockchain code. Our clients include leading projects such as...
-
On Chain Data Analyst
2 days ago
Thailand CertiK Full time**About the Company** One of the fastest-growing and most trusted companies in blockchain security, CertiK is a true market leader. To date, CertiK has worked with over 3,200 Enterprise clients, secured over $310 billion worth of digital assets, and has detected over 60,000 vulnerabilities in blockchain code. Our clients include leading projects such as...
-
Thailand CIMB Group Full time ฿1,200,000 - ฿2,400,000 per yearJob Descriptions:Lead on project implementation, direct design of security systems, direct design of security monitoring and alert, continuously improve information security controls, processes and operational procedures related to information security policy and standard.Track, manage to resolution the closure of security risks including review plans and...