Title: Cyber Security Engineer and Forensic Analyst
Company Name: Sterling Multi-technologies Limited
Vacancy: 01
Age: 28 to 35 years
Job Location: Dhaka
Salary: Negotiable
Experience:
● Good communication skills
● Good presentation skills
● Capability for Training
● High attention to detail when analyzing complex data sets, logs, and network flows to identify anomalies.
● A strong ethical compass, given the access to highly confidential and sensitive organizational data.
● Deep understanding of OS internals, registry analysis, and file systems (NTFS, APFS, ext4).
● Operating System: Windows, Linux, MacOS
● Proficiency in Spoken and Written English
Responsibilities & Context
● Plan, design, build, and configure security technologies including firewalls, VPNs, Intrusion Detection/Prevention Systems (IDS/IPS), and Data Loss Prevention (DLP) protocols.
● Monitor network traffic and system logs for suspicious activity using SIEM tools. Respond to security breaches, conduct root-cause analysis, and mitigate damage.
● Conduct regular security assessments, penetration testing, and vulnerability scans across networks, operating systems, and applications to identify and patch security gaps.
● Develop and enforce security policies, procedures, and best practices. Ensure system compliance with relevant industry regulations
● Securely acquire volatile and non-volatile data from compromised endpoints, mobile devices, and servers while strictly adhering to the chain of custody and forensic principles.
● Utilize industry-leading digital forensic platforms to process and analyze disk images, memory dumps, and network captures.
● Perform complex data extraction and recovery operations on damaged or encrypted devices, including hardware-level techniques like chip-off forensics or JTAG extractions.
● Conduct deep-dive analysis into system artifacts across various environments, with a strong focus on macOS system management, Linux root operations, and server filesystem architectures (including GPT layouts).
● Utilize Open-Source Intelligence techniques and methodologies to track threat actors, gather external evidence, and enrich internal investigations.
● Write and maintain custom scripts to automate routine evidence processing, parsing, or analysis tasks.