CrawlJobs Logo

Investigation & Forensic Analyst

gomillenniumsoft.com Logo

MillenniumSoft Inc

Location Icon

Location:
United States , San Diego

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

43.00 - 47.00 USD / Hour

Job Description:

The Investigation & Forensic Analyst is responsible for identifying exposures to Client sensitive information through forensic data acquisition, data collection from various platforms, forensic analysis, media preservation, restoration and conversion services. This position must be able to work with a high degree of independence and effectively interact with associates from entry level tech to Executive Vice Presidents. A strong combination of technical understanding, communication and documentation is vital to the success of this role.

Job Responsibility:

  • Properly acquire, preserve and process electronic data to industry standards
  • Perform forensic analysis on various devices
  • Produce quality evidence-based reports as necessary
  • Cyber incident triage and forensics evaluation for cyber threats
  • Interface effectively in key relationships such as Security Operations, and be able to partner with Legal and HR as necessary
  • Evaluate risk based on questionnaires and draft reports
  • Accountable for setting own work direction and completing work tasks
  • Conduct interviews and provide appropriate reports to key stakeholders which summarize the findings
  • Deliver investigation recommendations and reporting by collecting, evaluating and disseminating accurate and timely intelligence information to appropriate managers
  • Assist with additional projects as needed

Requirements:

  • Bachelor's Degree in Computer Science, Management Information Systems or related field
  • 1-3 years of experience conducting digital forensics or incident response in a full-time role
  • 1-3 years of experience conducting digital investigations in a corporate or law enforcement role
  • Previous experience with Data Loss Prevention technologies and platforms
  • Previous experience working with Encase and Forensic Toolkit (FTK)
  • Previous experience with Network monitoring tools
  • Incident management training and experience in a large-scale environment
  • In-depth knowledge of Windows operating systems
  • Excellent analytical and problem-solving skills
  • Proven ability to deliver tough messages in a professional manner
  • Proven ability to act independently and to execute with limited information and ambiguity

Nice to have:

  • Knowledge of other OS's such as IoS and Linux
  • CERT-Certified Computer Security Incident Handler Certification
  • CISSP
  • HCISSP
  • CFCE
  • GCFE
  • GCFA
  • EnCE

Additional Information:

Job Posted:
January 11, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Investigation & Forensic Analyst

Cyber Security-Fraud Analyst

The L2 Support Fraud Detection Senior Analyst is a pivotal team member responsib...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Tools: Octoflow, Mosaic
  • conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
Job Responsibility
Job Responsibility
  • Conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
  • collaborate with cross-functional teams for swift containment, investigation, and recovery
What we offer
What we offer
  • Inclusive and respectful work environment
  • positions open to people with disabilities.
  • Fulltime
Read More
Arrow Right

Security Threat Intelligence and Hunting Analyst

The Security Threat Intelligence and Hunting Analyst role at NTT DATA involves a...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Job Responsibility
Job Responsibility
  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Fulltime
Read More
Arrow Right

Security Threat Intelligence and Hunting Analyst

As a Security Threat Intelligence and Hunting Analyst, you will analyze and dete...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Job Responsibility
Job Responsibility
  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Fulltime
Read More
Arrow Right

Staff Security Investigation Analyst

The Staff Security Investigation Analyst will lead internal investigations relat...
Location
Location
United States
Salary
Salary:
113000.00 - 161000.00 USD / Year
alpha-sense.com Logo
AlphaSense
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in corporate investigations, forensics, or incident response
  • Hands-on experience with insider threat and DLP tooling (e.g., UEBA, E-discovery, SIEM, EDR, Code42, Dtex, Microsoft Purview, or similar)
  • Proficiency investigating in cloud-native environments (AWS, GCP, Azure) and SaaS platforms
  • comfortable with audit logs, IAM, and identity-based investigations
  • Knowledge of employment law, privacy regulations (GDPR, CCPA), and compliance standards
  • Experience conducting investigative interviews in sensitive employment contexts
  • Strong communication skills and ability to handle sensitive cases with discretion across all levels of the organization, including executives
  • Proficiency in case management and e-discovery tools.
Job Responsibility
Job Responsibility
  • Conduct investigations into insider threats, data exfiltration, IP theft, compliance violations, and policy breaches
  • Investigate incidents involving sensitive assets specific to our environment: source code, AI/ML models, training data, client intelligence, and research IP
  • Gather and analyze digital and physical evidence using established forensic methodologies (cloud audit logs, SaaS telemetry, endpoint data, and identity/access records)
  • Conduct investigative interviews with subjects, witnesses, and stakeholders, applying appropriate techniques for sensitive employment matters
  • Prepare detailed reports and documentation of investigative findings suitable for executive leadership, legal proceedings, and regulatory inquiries
  • Collaborate with HR, Legal, and Compliance teams to manage sensitive matters appropriately
  • Maintain case management systems and ensure confidentiality and chain of custody integrity of investigation data
  • Develop and enhance investigation protocols, evidence handling standards, and response workflows
  • Identify patterns, trends, or emerging risks from investigation data and recommend preventive controls, detection improvements, and policy changes
  • Provide executive-level reporting on investigation trends, program metrics, and risk posture
What we offer
What we offer
  • performance-based bonus
  • equity
  • a generous benefits program
  • Fulltime
Read More
Arrow Right

Senior Security Investigator

The CyberSecurity Incident Response team (CIRT) is at the forefront of protectin...
Location
Location
United States , Seattle; San Francisco; Sunnyvale
Salary
Salary:
180000.00 - 200000.00 USD / Year
uber.com Logo
Uber
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 5+ years of experience in Security Investigations, Incident Response, Threat Hunting, or Digital Forensics within large-scale or high-risk environments.
  • Proven expertise with forensic tooling, log analysis, SIEM platforms, EDR solutions, and cloud investigation workflows (AWS/GCP/Azure).
  • Strong understanding of attacker TTPs, modern threat landscape, and frameworks like MITRE ATT&CK.
  • Hands-on experience building automation using Python, APIs, SOAR, or equivalent frameworks.
  • Ability to lead complex investigations end-to-end and communicate findings effectively to senior leadership.
  • Experience running or contributing to large cross-company security projects.
Job Responsibility
Job Responsibility
  • Lead complex security investigations end-to-end and perform deep forensic analysis across endpoints, cloud environments, identity systems, networks, and application logs to uncover root cause and attack paths.
  • Own & Build automation and tooling to accelerate evidence collection, log enrichment, triage workflows, and decision-making at global scale.
  • Improve detection and response capabilities by partnering with Threat Intelligence, Detection Engineering, and Platform teams.
  • Lead major cross-functional security initiatives that strengthen investigative readiness, digital forensics, cloud incident response, and threat-hunting capabilities.
  • Mentor and develop investigators and analysts, providing technical guidance, reviewing casework, and elevating investigative rigor.
  • Continuously evolve investigation methodology by analyzing trends, identifying gaps, and embedding lessons learned back into the security ecosystem.
What we offer
What we offer
  • Eligible to participate in Uber's bonus program
  • May be offered an equity award & other types of comp
  • Eligible for various benefits (details at provided link)
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right