WORK WITH US

HOORAY! THERE ARE 3 OPEN POSITION IN OUR COMPANY:
TIME TO START YOUR CAREER!

LEARN MORE

Background

Do you have what it takes?

Being a security expert is not easy. We choose only the best of the best, to guarantee the excellence in any of our services.

Please fill in the form and we will be happy to evaluate your skills.
If you’ll be compliant with the requirement, we will get in touch very soon for a Skype interview, and ket to know each other a bit better.
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.


See open positions


    Cybersecurity Forensics Specialist

    Job Title: Cybersecurity Forensics Specialist

    Job Description: The Cybersecurity Forensics Specialist is responsible for conducting detailed investigations and analysis of security incidents and breaches within an organization’s digital infrastructure. This role focuses on identifying, collecting, preserving, and analyzing digital evidence to determine the root cause of security incidents and mitigate future risks.

    Key Responsibilities:

    1. Conduct thorough investigations: Perform in-depth examinations of digital assets, systems, and networks to identify and assess potential security breaches or incidents.
    2. Digital evidence collection: Gather and preserve digital evidence using appropriate forensic techniques and tools, ensuring chain of custody and maintaining the integrity of the evidence.
    3. Forensic analysis: Analyze and interpret collected data and digital artifacts to reconstruct events, identify intrusion methods, and determine the extent of damage caused by cyber threats.
    4. Incident response: Collaborate with incident response teams to contain, mitigate, and remediate security incidents effectively.
    5. Reporting and documentation: Prepare detailed reports and documentation of findings, methodologies, and recommendations for stakeholders, including management and legal authorities, as necessary.
    6. Collaboration and knowledge sharing: Work closely with cross-functional teams, such as IT, legal, and law enforcement, to facilitate information exchange and support investigations.
    7. Stay updated on cyber threats: Keep abreast of the latest cyber threats, attack techniques, and forensic methodologies to enhance investigative capabilities and proactively address emerging risks.
    8. Compliance and legal requirements: Ensure investigations adhere to relevant laws, regulations, and industry standards, including data privacy and handling procedures.

    Qualifications and Skills:

    • Bachelor’s degree in Cybersecurity, Computer Science, or a related field (or equivalent work experience).
    • Strong knowledge of digital forensic principles, methodologies, and tools.
    • Proficiency in using forensic software and tools, such as EnCase, FTK, Autopsy, or X-Ways.
    • Experience with log analysis, network traffic analysis, and malware analysis.
    • Understanding of computer systems, networks, and operating systems.
    • Knowledge of relevant laws, regulations, and industry standards related to digital forensics and incident response.
    • Excellent problem-solving and analytical skills, with attention to detail.
    • Effective communication skills to convey complex technical concepts to non-technical stakeholders.
    • Relevant certifications, such as Certified Forensic Examiner (CFE), Certified Information Systems Security Professional (CISSP), or Certified Computer Examiner (CCE), are desirable.
    • Prior experience in incident response or cybersecurity investigations is advantageous.

    check Required scientifical degree

    check Good teamwork abilities

    check Good communication skills

    check Good at FPS gaming!




    Cryptography Expert

    Job Title: Cryptography Expert

    Job Description: The Cryptography Expert is responsible for ensuring the secure design, implementation, and maintenance of cryptographic systems within an organization. This role involves developing and implementing cryptographic protocols, conducting vulnerability assessments, and providing guidance on encryption-related matters to enhance the overall security posture of the organization.

    Key Responsibilities:

    1. Cryptographic system design: Design and implement secure cryptographic systems, including encryption algorithms, key management, and cryptographic protocols.
    2. Vulnerability assessments: Assess the security of cryptographic systems and identify potential vulnerabilities or weaknesses in their design or implementation.
    3. Encryption guidance: Provide expert advice and guidance on encryption-related matters, such as selecting appropriate cryptographic algorithms, key lengths, and encryption schemes.
    4. Cryptographic implementation review: Review and assess the implementation of cryptographic systems to ensure adherence to best practices and industry standards.
    5. Key management: Develop and implement robust key management processes and procedures, including key generation, distribution, storage, and revocation.
    6. Cryptographic research: Stay updated on the latest advancements in cryptography, including emerging algorithms, protocols, and attacks, to evaluate their relevance and potential impact on the organization’s security.
    7. Incident response: Assist in cryptographic incident response activities, such as investigating security incidents related to encryption or cryptographic systems.
    8. Compliance and standards: Ensure compliance with relevant regulations, standards, and frameworks pertaining to cryptography, such as ISO/IEC 27001, NIST SP 800-57, or PCI DSS.

    Qualifications and Skills:

    • Bachelor’s degree in Computer Science, Cryptography, Mathematics, or a related field (or equivalent work experience).
    • Strong knowledge of cryptographic principles, algorithms, and protocols (e.g., symmetric cryptography, asymmetric cryptography, hashing, digital signatures).
    • Proficiency in cryptographic tools and libraries, such as OpenSSL, Bouncy Castle, or Cryptlib.
    • Experience with cryptographic system design and implementation, including key management practices.
    • Familiarity with relevant cryptographic standards, such as AES, RSA, ECC, Diffie-Hellman, or SHA.
    • Understanding of cryptographic attacks, vulnerabilities, and countermeasures.
    • Knowledge of network and system security principles and practices.
    • Excellent problem-solving and analytical skills, with attention to detail.
    • Effective communication skills to convey complex cryptographic concepts to both technical and non-technical stakeholders.
    • Relevant certifications, such as Certified Cryptography Expert (CCE), Certified Information Systems Security Professional (CISSP), or Certified Secure Software Lifecycle Professional (CSSLP), are desirable.
    • Prior experience in cryptographic system design, implementation, or evaluation is advantageous.

    check Required scientifical degree

    check Good teamwork abilities

    check Good communication skills