SEC504: Hacker Tools, Techniques, and Incident Handling

Analyze network and endpoint data to swiftly detect threats, conduct forensic investigations, and proactively hunt adversaries across diverse platforms including cloud, mobile, and enterprise systems.
Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.
Evaluates IT programs for compliance, identifying gaps and ensuring conformance with published tech and security standards and policies.
Leads IT project management to deliver services or products, ensuring milestones, budgets, and mission alignment are successfully achieved.
Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital.
Manages tools and processes to identify, store, and access institutional knowledge, ensuring efficient use of organizational intellectual assets.
Malware analysts face attackers’ capabilities head-on, ensuring the fastest and most effective response to and containment of a cyber-attack. You look deep inside malicious software to understand the nature of the threat – how it got in, what flaw it exploited, and what it has done, is trying to do, or has the potential to achieve.
This expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.
Execute digital forensic operations under demanding conditions, rapidly extracting critical intelligence from diverse devices. Leverage advanced threat hunting and malware analysis skills to neutralize sophisticated cyber adversaries.
Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.