Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
Role Overview
We are looking for a Compromise Management Analyst to support incident response and forensic investigations within a large telecom security environment.
The role focuses on identifying, analyzing, and responding to security compromises affecting telecom infrastructure and enterprise platforms.
Key Responsibilities
Perform incident response and forensic investigations across telecom environments (2G / 4G / 5G infrastructure)
Identify indicators of compromise and assess scope, impact, and root cause
Execute containment, eradication, and recovery activities in coordination with SOC and NOC teams
Conduct Linux, Windows, Cloud, and enterprise-scale digital forensics
Analyze logs, memory, disk images, and network traffic to support investigations
Prepare detailed incident reports and post-incident analysis
Support continuous improvement of incident response processes and playbooks
Required Skills & Experience
Proven experience in telecommunications security incidents
Linux Forensics
Windows Forensics
Cloud Forensics
Enterprise-scale Digital Incident & Forensic Response (DFIR)
Hands-on experience responding to real-world cyber incidents
Ability to work under pressure in critical incident scenarios
Certifications (Mandatory)
GCFR – GIAC Certified Forensic Responder
GCFA – GIAC Certified Forensic Analyst
Preferred Qualifications
Experience in national-scale or critical infrastructure environments
Exposure to SOC operations and threat intelligence workflows
Strong reporting and stakeholder communication skills
You'll no longer be considered for this role and your application will be removed from the employer's inbox.