Cyber Security Engineer and Forensic Analyst

Job Description

Title: Cyber Security Engineer and Forensic Analyst

Company Name: Sterling Multi-technologies Limited

Vacancy: 01

Age: 28 to 35 years

Job Location: Dhaka

Salary: Negotiable

Experience:

  • 1 to 3 years
  • The applicants should have experience in the following business area(s): Software Company, Engineering Firms


Published: 2026-04-16

Application Deadline: 2026-05-14

Education:
    • Bachelor of Science (BSc) in Computer Science & Engineering
    • Master of Science (MSc) in Computer Science & Engineering


Requirements:
  • 1 to 3 years
  • The applicants should have experience in the following business area(s): Software Company, Engineering Firms


Skills Required: Cyber Security,Software Development,Software Implementation

Additional Requirements:
  • Age 28 to 35 years
  • Only Male

●        Good communication skills

●        Good presentation skills

●        Capability for Training

●        High attention to detail when analyzing complex data sets, logs, and network flows to identify anomalies.

●        A strong ethical compass, given the access to highly confidential and sensitive organizational data.

●        Deep understanding of OS internals, registry analysis, and file systems (NTFS, APFS, ext4).

●        Operating System: Windows, Linux, MacOS

●        Proficiency in Spoken and Written English



Responsibilities & Context:

Responsibilities & Context

●        Plan, design, build, and configure security technologies including firewalls, VPNs, Intrusion Detection/Prevention Systems (IDS/IPS), and Data Loss Prevention (DLP) protocols.

●        Monitor network traffic and system logs for suspicious activity using SIEM tools. Respond to security breaches, conduct root-cause analysis, and mitigate damage.

●        Conduct regular security assessments, penetration testing, and vulnerability scans across networks, operating systems, and applications to identify and patch security gaps.

●        Develop and enforce security policies, procedures, and best practices. Ensure system compliance with relevant industry regulations

●        Securely acquire volatile and non-volatile data from compromised endpoints, mobile devices, and servers while strictly adhering to the chain of custody and forensic principles.

●        Utilize industry-leading digital forensic platforms to process and analyze disk images, memory dumps, and network captures.

●        Perform complex data extraction and recovery operations on damaged or encrypted devices, including hardware-level techniques like chip-off forensics or JTAG extractions.

●        Conduct deep-dive analysis into system artifacts across various environments, with a strong focus on macOS system management, Linux root operations, and server filesystem architectures (including GPT layouts).

●        Utilize Open-Source Intelligence techniques and methodologies to track threat actors, gather external evidence, and enrich internal investigations.

●        Write and maintain custom scripts to automate routine evidence processing, parsing, or analysis tasks.



Job Other Benifits:

Employment Status: Full Time

Job Work Place: Work at office

Company Information:

Gender: Only Male can apply

Read Before Apply: Please apply only who are fulfilling all the requirements of this job

Category: Engineer/Architects

Similar Jobs