±Forensic Focus Partners
±Your Account

![]() |
![]() |
![]() |
![]() |
±Latest Articles
±Latest Videos
±Latest Jobs
Back to top
Skip to content
Skip to menu
Back to top
Back to main
Skip to menu
Below is a list of classes that my college provided for my degree (it varies per college". The main association being
"Computer Forensics Fundamentals", where we used Access Data's FTK tools.
Below are more.
Unix/Linux
Cryptology
PC Hardware
Ethical Hacking
Windows Server
Database Design
Wireless Security
Computer Ethics
Database Systems
Professional Ethics
Computer Security
Networking Security
E-Commerce Security
Cyber Security Capstone
Networking Infrastructure
SQL Server Administration
Cyber Crime and Terrorism
Cyber Testing & Penetration
Programming Fundamentals
UNIX Administration & Security
Cyber Security & Information Assurance
Cyber Security Computer Forensic Analyst - Columbus, OH
-
jpickens - Senior Member
Cyber Security Computer Forensic Analyst - Columbus, OH
We have an open role in our Ohio team for a forensic analyst. This role is part of a global team of cyber security digital forensic instigators.
This role requires a wide variety of strengths and capabilities, including:
•Bachelor’s degree or equivalent experience
•Foundational knowledge of cyber security organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
•Ability to collaborate with high-performing Agile teams and individuals throughout the firm to accomplish goals
•Proficiency in the use of skills tools, staying current with skills, participating in multiple forums
•Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence
•Foundational knowledge of: computer forensics; legal, government and jurisprudence as they relate to cyber security; operating systems; and methods for intelligence gathering and sharing
•Foundational knowledge of: cloud computing, computer network defense, external organizations and academic institutions dealing with cyber security issues, financial authorities and regulations, identity management, incident management, information assurance, information management, information systems and network security and infrastructure design
•Preserve network and host-based digital evidence in an industry accepted forensically sound manner
•Experience conducting digital forensics examinations on Windows operating systems using industry standard forensic tools (preferably familiar with EnCase, FTK and X-Ways forensic suites)
Full job description is HERE.
This role requires a wide variety of strengths and capabilities, including:
•Bachelor’s degree or equivalent experience
•Foundational knowledge of cyber security organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
•Ability to collaborate with high-performing Agile teams and individuals throughout the firm to accomplish goals
•Proficiency in the use of skills tools, staying current with skills, participating in multiple forums
•Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence
•Foundational knowledge of: computer forensics; legal, government and jurisprudence as they relate to cyber security; operating systems; and methods for intelligence gathering and sharing
•Foundational knowledge of: cloud computing, computer network defense, external organizations and academic institutions dealing with cyber security issues, financial authorities and regulations, identity management, incident management, information assurance, information management, information systems and network security and infrastructure design
•Preserve network and host-based digital evidence in an industry accepted forensically sound manner
•Experience conducting digital forensics examinations on Windows operating systems using industry standard forensic tools (preferably familiar with EnCase, FTK and X-Ways forensic suites)
Full job description is HERE.
-
jbarber - Newbie
Re: Cyber Security Computer Forensic Analyst - Columbus, OH
Hi! Is this a remote optional position? I am in Lexington, KY.
Thanks
Jim
Thanks
Jim
-
armresl - Senior Member
Re: Cyber Security Computer Forensic Analyst - Columbus, OH
No Jim, it's not.
_________________
Why order a taco when you can ask it politely?
Alan B. "A man can live a good life, be honorable, give to charity, but in the end, the number of people who come to his funeral is generally dependent on the weather. "
- jbarberHi! Is this a remote optional position? I am in Lexington, KY.
Thanks
Jim
_________________
Why order a taco when you can ask it politely?
Alan B. "A man can live a good life, be honorable, give to charity, but in the end, the number of people who come to his funeral is generally dependent on the weather. "
-
jbarber - Newbie
-
cybersecurity - Newbie
Re: Cyber Security Computer Forensic Analyst - Columbus, OH
Hello,
I'm located in Washing state and just graduated with a B.A.S in Cyber Security.
I'm willing to relocate, but I'm not too sure if this is an "entry level" position or if your organization has any entry level position.
I've been avidly seeking employment anywhere in the United States. Any hints, tips, suggestions, or comments would be helpful; regarding acquiring employment in the computer forensics / E discovery sector.
Thanks!
I'm located in Washing state and just graduated with a B.A.S in Cyber Security.
I'm willing to relocate, but I'm not too sure if this is an "entry level" position or if your organization has any entry level position.
I've been avidly seeking employment anywhere in the United States. Any hints, tips, suggestions, or comments would be helpful; regarding acquiring employment in the computer forensics / E discovery sector.
Thanks!
-
armresl - Senior Member
Re: Cyber Security Computer Forensic Analyst - Columbus, OH
The easiest way to answer that is, If you owned that company, would you trust your data, investigations, security, and infrastructure with you?
Or, do you go with the guy who has been doing it for awhile?
That's basically the decision all the HR people and the people who will interview/test you will be thinking and what you will need to ask yourself to see how you can stand out from others.
Not sure what cyber security entails vs. IR, DR, or investigations in general.
_________________
Why order a taco when you can ask it politely?
Alan B. "A man can live a good life, be honorable, give to charity, but in the end, the number of people who come to his funeral is generally dependent on the weather. "
Or, do you go with the guy who has been doing it for awhile?
That's basically the decision all the HR people and the people who will interview/test you will be thinking and what you will need to ask yourself to see how you can stand out from others.
Not sure what cyber security entails vs. IR, DR, or investigations in general.
- cybersecurityHello,
I'm located in Washing state and just graduated with a B.A.S in Cyber Security.
I'm willing to relocate, but I'm not too sure if this is an "entry level" position or if your organization has any entry level position.
I've been avidly seeking employment anywhere in the United States. Any hints, tips, suggestions, or comments would be helpful; regarding acquiring employment in the computer forensics / E discovery sector.
Thanks!
_________________
Why order a taco when you can ask it politely?
Alan B. "A man can live a good life, be honorable, give to charity, but in the end, the number of people who come to his funeral is generally dependent on the weather. "
-
cybersecurity - Newbie
Re: Cyber Security Computer Forensic Analyst - Columbus, OH
- armresl
Not sure what cyber security entails vs. IR, DR, or investigations in general.
Below is a list of classes that my college provided for my degree (it varies per college". The main association being
"Computer Forensics Fundamentals", where we used Access Data's FTK tools.
Below are more.
Unix/Linux
Cryptology
PC Hardware
Ethical Hacking
Windows Server
Database Design
Wireless Security
Computer Ethics
Database Systems
Professional Ethics
Computer Security
Networking Security
E-Commerce Security
Cyber Security Capstone
Networking Infrastructure
SQL Server Administration
Cyber Crime and Terrorism
Cyber Testing & Penetration
Programming Fundamentals
UNIX Administration & Security
Cyber Security & Information Assurance