BECIL Forensic Experts & Crypto Anlysts Recruitment on 32 Positions | Eligibility, Date, Application Form
BECIL Analyst, Technical Expert Recruitment Notification 2020- Analyst, Technical Expert Vacancy have been announced based upon Graduate, PG Diploma, Post Graduate, BE, B.Tech passed candidates who are looking for Analyst, Technical Expert jobs under BECIL Job Notifications published on its official website. All aspirants have to apply for Analyst, Technical Expert Jobs upto 06-05-2020 by following offline/ online procedures available for which you read BECIL Analyst, Technical Expert Recruitment notification which contains all eligibility conditions for Analyst, Technical Expert Vacancies. You can also download BECIL Analyst, Technical Expert Application Form along with notification at the end of article by just read all related information. You can also visit to BECIL Official website to apply directly at the link with BECIL Analyst, Technical Expert Recruitment Notification PDF available with us.
Latest BECIL Analyst Jobs 2024 Notification
Name of Organization |
BECIL |
Vacancies |
Technical Expert, Analyst |
Total Vacancies |
32 |
Closing Date |
06-05-2020 |
Job Location |
Delhi, NCR, New Delhi |
Company Official Website |
https://www.becil.com/ |
BECIL Analyst Recruitment Qualification Criteria:
Vacancy wise Information:
- Technical Expert: 28
- Analyst: 04
Education:
Bachelor in IT/ Computer Science/ Electronics and Telecommunication; or Engineering Graduate / M. Tech ; or BCA / MCA or any other post graduate degree in the area of IT/ Computer Science/ Electronics and Telecommunication
Job Description:
Mobile Forensic Expert
- Ability to identify the fundamental concepts and technologies involved in mobile forensics ï‚· Knowledge of mobile device wireless communication technologies ï‚· Analysing the data on a variety of conventional phones/smart phones, as well as having indepth understanding of the limitations of existing methods for extracting data from these devices. ï‚· Ability to decode/query and extract the data from latest versions of popular file systems like android, iOS, Blackberry OS etc., ï‚· Ability to reverse engineer software packages ï‚· Ability to write executive summary and detailed report writing of the analysed devices ï‚· Demonstrated hands-on experience of proprietary and open source mobile forensic tools ï‚· Ability to selectively eliminate irrelevant information and determine the proper tool for analysis ï‚· Ability to extract data in advanced mobile forensic methods like chip-off, JTAG etc. ï‚· Conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation ï‚· Thorough understanding of standard evidence handling procedures ï‚· Proficient with digital forensic techniques and the most commonly used computer forensic tools
Network Forensic Expert
- Ability to independently evaluate multiple operating systems, network configurations, network architectures, and topologies for identifying attacks/vulnerabilities. ï‚· Demonstrate in-depth knowledge of network capturing/assessing tools used to analyse traffic at the application layer, network layer, translating it to identify and interpret inconsistent/anomalous activity in packet details. ï‚· Ability for capturing network data, collection, distribution, analysis and presentation. ï‚· Familiarity in data analysis and visualization. ï‚· Ability to analyse log from multiple IT assets. ï‚· Knowledge of common tools that can facilitate large-scale analysis and repeatable workflows and libraries that can be linked to custom tools and solutions ï‚· Ability to establish and present a timeline of the attacker's activities. ï‚· Develop planning and strategy for capturing packets from commercial and home-built platforms, devices. ï‚· Provide capacity building trainings to employees to prevent, detect, or mitigate the same or similar attacks. ï‚· Conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation ï‚· Thorough understanding of standard evidence handling procedures ï‚· Proficient with forensic techniques and the most commonly used computer forensic tools
Memory Forensic Expert
- The memory forensic expert will analyse computer’s memory dump to investigate and identify artefacts of cybercrime. Memory forensic expert will provide visibility of the run time status of the system. ï‚· Collect important artefacts like those relating to process running, disk encryption keys, chat records and active network connections. ï‚· Perform memory forensics, analysis and extract IOCs (Indicators of Compromise) ï‚· Document process, procedure and reports pertaining to incident detection and response related to memory. ï‚· Ability to acquire memory/RAM from various OS (windows, Linux, Mac) and devices (desktops, Laptops, Tablets etc.) ï‚· Ability to detect intrusions in real-time ï‚· Ability to use standard memory forensic tools, including Encase, FTK, write blockers, disk imaging tools etc. ï‚· Understanding of tools such as Volatility framework, Redline etc. for analysis of RAM dumps ï‚· Understanding of process memory, event logs, Registry in memory. ï‚· Ability to track user activity ï‚· Ability to reconstruct events and timelines ï‚· Evidence management and chain of custody to ensure that the continuity and integrity of evidences is preserved ï‚· Provide regular briefings and updates to the management
- ï‚· Conduct research into new tools and techniques to enhance memory analysis process ï‚· Conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation ï‚· Thorough understanding of standard evidence handling procedures ï‚· Proficient with forensic techniques and the most commonly used computer forensic tools
Malware Forensic Expert
- Examine malicious software, such as virus, worms, Trojans etc. to understand their structure/ signature/ behaviour. ï‚· In-depth knowledge of OS & Application software internals, capable of documenting the attack capabilities of the malwares, understand its propagation characteristics, and define/create signatures for detecting its presence. ï‚· Ability to identify and classify malware families based on standard taxonomy ï‚· Stay abreast with latest malware threats and recommend IT infrastructure to defend against them. ï‚· Collect structured and unstructured data from enterprise file servers, email, database systems ï‚· Utilizes understanding of attack signatures, tactics, techniques and procedures associated with advanced threats ï‚· Analyse the attack/exploit capability of malware, document, and catalogue findings and Develop necessary procedures or scripts to identify such data in future. ï‚· Analyse collected media for defensive cyber operations and understand adversary technical capabilities, Tactics, Techniques and Procedures (TTP) and methods of employment. ï‚· Understanding of tools and technologies to identify zero day attacks. ï‚· Present tactical and strategic intelligence about threat actors, methodologies, and motivations based on malware research and develop methods of tracking and detecting malicious activity within a network. ï‚· Use various tools and techniques to analyse malicious document files, executables and webbased malware. ï‚· Conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation ï‚· Thorough understanding of standard evidence handling procedures ï‚· Proficient with forensic techniques and the most commonly used computer forensic tools
Cloud Forensics Expert
- Examine artefacts related to virtualization and various cloud storage applications or services. ï‚· In-depth knowledge of investigations in virtual environments, cloud forensic models, Architectures, chain of dependencies etc. ï‚· Ability to acquire data remnants from Dropbox, SkyDrive, Google Drive etc. ï‚· Ability to identify evidence source and its preservation ï‚· Examination and analysis of cloud based data or artefacts ï‚· Utilize proprietary and open source tools for doing forensic analysis ï‚· Ability of remote acquisition of data ï‚· Ability to reconstruct events in the Cloud ï‚· Ability to trace an event and assess the current state of an event in the Cloud ï‚· Understanding of laws, SLA etc., in cases of multi-jurisdiction and multi-tenancy environment ï‚· Ability to collect, analyse and correlate logs across multiple systems in cloud. ï‚· Conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation ï‚· Thorough understanding of standard evidence handling procedures ï‚· Proficient with forensic techniques and the most commonly used computer forensic tools
Crypto Analysts
- Examine artefacts related to cryptographic and various crypto storage applications or services. ï‚· In-depth knowledge of investigations in encryption concepts, chain of dependencies etc.
- ï‚· Perform analytics on crypto products like crypto-currencies using available tools as well as through developing bespoke tools ï‚· Identifying any weakness in existing cryptography systems with a view to making them more secure. ï‚· Identifying ways and means to work with encrypted data to aid LEAs. ï‚· Conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation ï‚· Thorough understanding of standard evidence handling procedures ï‚· Proficient with forensic techniques and the most commonly used computer forensic tools ï‚· Excellent oral and written communication skills ï‚· Understands user and machine authentication and encryption mechanisms. ï‚· Expertise in token technologies, PKI, OAuth and SAML ï‚· Experience with security protocols including SSL/TLS, HTTPS, PGP, AES, DES, SSH, SCP, Kerberos, IPSEC ï‚· Strong working and practical knowledge of TCP/IP and UDP/IP networking layer. ï‚· Ability to write in-house tools, extenders and automated scripts
BECIL Analyst Selection Process:
- Written Tst
- Interview
- Merit List
Salary:
As per Notification
How to apply for BECIL Analyst Job Notification
- Visit BECIL Official Site
- Visit to Recruitment / Career Notification Section and click on Forensic Experts & Crypto Anlysts Vacancy
- Understand about Forensic Experts & Crypto Anlysts recruitment notification carries all as per age, address and other process
- You can download Forensic Experts & Crypto Anlysts Application Form and send as per detaBECIL available online or offline
BECIL Analyst Form & Official Notification
With help of Freshhiring Team, we are wish you best of luck of for your future. We will keep bringing latest Live updates with us about latest Government Jobs, Results, Interviews where you can even check all latest opening in private section with us. Just check here latest files with us and click on Apply Now button here.
Last Date: 06-05-2020
Check all notifations here.
More category jobs you may like
ANGRAU Guntur Recruitment Notification 2021 - on 04/12/2021 Teaching Assistant V...
Read More
Indian Army Recruitment Notification 2021 - on 02/01/2021 Officer Vacancy (55 po...
Read More
Northeast Frontier Railway Recruitment Notification 2020 - on 20/08/2020 Apprent...
Read More
UPSC Recruitment Notification 2020 - on 20/08/2020 Officer Vacancy (209 posts) h...
Read More
Cabinet Secretariat Government of India Recruitment Notification 2020 - on 06/07...
Read More
Quality Council of India - QCI Recruitment Notification 2020 - on 06/07/2020 Sec...
Read More
IBPS Recruitment Notification 2020 - on 11/06/2020 Professor Vacancy (29 posts) ...
Read More
Ministry of Home Affairs Recruitment Notification 2020 - on 10/06/2020 Senior Dr...
Read More
Konkan Railway Recruitment Notification 2020 - on 09/06/2020 Chief Signal and Te...
Read More
Konkan Railway Recruitment Notification 2020 - on 09/06/2020 Chief Project Manag...
Read More
NIA Recruitment Notification 2020 - on 09/06/2020 Explosive Expert Vacancy (10 p...
Read More
ECIL Recruitment Notification 2020 - on 05/06/2020 Technical Officer Vacancy (02...
Read More
Latest Results By Department Name
Top Government Jobs in India