This role involves providing digital forensic and cybersecurity incident response support, including investigating data breaches, malware analysis, threat hunting, and preparing forensic reports, to help clients address security incidents and improve their cybersecurity posture.
Key Responsibilities
Execute security and privacy investigations, including breach detection, threat analysis, incident response, and malware analysis.
Provide digital forensic support for data security incidents such as data breaches or fraud.
Draft forensic reports, affidavits, and testify as an expert in digital forensics and incident response.
Conduct forensic analysis of digital information using evidence handling techniques and forensic tools.
Identify, research, and organize data to facilitate effective analysis and assess data sufficiency.
Acquire digital evidence from hosts and analyze for signs of compromise and impact.
Detect and hunt malware, including unknown and custom variants, across enterprise environments.
Create Indicators of Compromise (IOCs) to enhance incident response and threat intelligence.
Track adversary activity through timeline analysis, memory forensics, and network traffic examination.
Assess cybersecurity controls and provide technical guidance based on cybersecurity frameworks.
Requirements
Bachelor's or Master's degree with a relevant academic focus in Computer Science, Digital Forensics, Information Security, or Information Systems.
2-4 years of relevant work experience in financial economic analysis, preferably in a consulting firm, or recent graduates or candidates in the workforce may be hired into the Analyst title.
Digital forensics incident response training and certifications, including SANS GIAC GCFA, GCFE, GNFA, GIME, IACIS CFCE or CIFR, Magnet MCFE, X-ways X-Pert or similar.
Strong understanding of computer operating systems, software, and hardware.
Ability to conduct detailed forensic investigations and analysis of computers, networks, mobile devices, and removable media.
Experience with conducting digital forensic analysis using commercial and open source forensic tools, including file system forensics, memory analysis, and network analysis.
Experience with conducting static and dynamic malware analysis in a lab environment and threat hunting in a live environment.
Experience in collegiate computer security competitions.
Strong understanding of proper evidence handling procedures and chain of custody.
Experience with drafting technical and investigative reports and communicating technical findings.
Experience with utilizing automation tools and scripts to expedite analysis.
Understanding incident handling procedures including preparation, identification, containment, eradication, and recovery to protect enterprise environments.
Understanding of common attack techniques used by adversaries on a victim network and leveraging those techniques to stop further adversary activity.
Ability to forensically acquire data and images from identified hosts, locate evidence of compromise, and determine its impact from disk, file, memory, and log analysis.
Ability to identify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary.
Ability to detect and hunt unknown live, dormant, and custom malware across multiple hosts in an enterprise environment.
Ability to create Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts.
Skill in tracking adversary activity second-by-second on a host via in-depth timeline analysis.
Knowledge of the evidence needed to determine the type of malware used in an attack, including rootkits, backdoors, and Trojan horses, and selecting appropriate defenses and response tactics for each.
Ability to identify lateral movement and pivots within client enterprises, showing how an adversary transitions from system to system without detection.
Proficiency in using physical memory analysis tools to determine an adversary’s activities on a host and across hosts used as pivot points.
Ability to examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation.
Skill in identifying and tracking malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections.
Providing technical assessment, audit, and guidance to clients on the adequacy of cybersecurity controls in accordance with frameworks such as NIST CSF 2.0, HIPAA, ISO 27001 and 27002, SOC2, NERC-CIP.
Ability to participate in practice-building activities including recruiting and training.
Benefits & Perks
Salary range of $92,500 - $105,000 with potential bonus incentive compensation
Work location flexibility with at least 3 to 4 days in the office and options for remote work
Comprehensive benefits package including medical, dental, and vision insurance
401(k) retirement plan with employer match
Life and disability insurance
Paid time off including vacation, sick leave, holidays, and paid parental leave
Wellness programs and employee assistance resources
In-house immigration support for foreign nationals and international business travelers
Skills development programs with 100 hours of annual training
Leadership and collaboration opportunities through internal activities
Ready to Apply?
Join Charles River Associates and make an impact in renewable energy