SEC504: Hacker Tools, Techniques, and Incident Handling

Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity.
Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.
Security Operations Center (SOC) analysts work alongside security engineers and SOC managers to implement prevention, detection, monitoring, and active response. Working closely with incident response teams, a SOC analyst will address security issues when detected, quickly and effectively. With an eye for detail and anomalies, these analysts see things most others miss.
Analyze network and endpoint data to swiftly detect threats, conduct forensic investigations, and proactively hunt adversaries across diverse platforms including cloud, mobile, and enterprise systems.
Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.
Evaluates IT programs for compliance, identifying gaps and ensuring conformance with published tech and security standards and policies.
Leads IT project management to deliver services or products, ensuring milestones, budgets, and mission alignment are successfully achieved.
Conducts system-level target development, maintains Electronic Target Folders, and runs collaborative working groups to support coordinated targeting.
Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital.
Manages tools and processes to identify, store, and access institutional knowledge, ensuring efficient use of organizational intellectual assets.
Malware analysts face attackers’ capabilities head-on, ensuring the fastest and most effective response to and containment of a cyber-attack. You look deep inside malicious software to understand the nature of the threat – how it got in, what flaw it exploited, and what it has done, is trying to do, or has the potential to achieve.
This expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.