CrawlJobs Logo

Staff Security Investigation Analyst

alpha-sense.com Logo

AlphaSense

Location Icon

Location:
United States

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

113000.00 - 161000.00 USD / Year

Job Description:

The Staff Security Investigation Analyst will lead internal investigations related to insider threats, data loss, policy violations, and security incidents. Beyond reactive casework, this role will proactively identify behavioral indicators and anomalies that may signal insider risk, partnering with detection teams to continuously improve our investigative and monitoring capabilities. You'll work cross-functionally with Legal, HR, Security Operations, IT, and Engineering to ensure investigations are conducted ethically, thoroughly, and with appropriate discretion.

Job Responsibility:

  • Conduct investigations into insider threats, data exfiltration, IP theft, compliance violations, and policy breaches
  • Investigate incidents involving sensitive assets specific to our environment: source code, AI/ML models, training data, client intelligence, and research IP
  • Gather and analyze digital and physical evidence using established forensic methodologies (cloud audit logs, SaaS telemetry, endpoint data, and identity/access records)
  • Conduct investigative interviews with subjects, witnesses, and stakeholders, applying appropriate techniques for sensitive employment matters
  • Prepare detailed reports and documentation of investigative findings suitable for executive leadership, legal proceedings, and regulatory inquiries
  • Collaborate with HR, Legal, and Compliance teams to manage sensitive matters appropriately
  • Maintain case management systems and ensure confidentiality and chain of custody integrity of investigation data
  • Develop and enhance investigation protocols, evidence handling standards, and response workflows
  • Identify patterns, trends, or emerging risks from investigation data and recommend preventive controls, detection improvements, and policy changes
  • Provide executive-level reporting on investigation trends, program metrics, and risk posture
  • contribute to tabletop exercises and cross-functional training.

Requirements:

  • 5+ years of experience in corporate investigations, forensics, or incident response
  • Hands-on experience with insider threat and DLP tooling (e.g., UEBA, E-discovery, SIEM, EDR, Code42, Dtex, Microsoft Purview, or similar)
  • Proficiency investigating in cloud-native environments (AWS, GCP, Azure) and SaaS platforms
  • comfortable with audit logs, IAM, and identity-based investigations
  • Knowledge of employment law, privacy regulations (GDPR, CCPA), and compliance standards
  • Experience conducting investigative interviews in sensitive employment contexts
  • Strong communication skills and ability to handle sensitive cases with discretion across all levels of the organization, including executives
  • Proficiency in case management and e-discovery tools.

Nice to have:

  • Certifications such as CFE, CFCE, or GIAC-related credentials
  • Experience in AI, technology, financial services, or market intelligence industries
  • Background in intelligence analysis, law enforcement, or government insider threat programs
  • Familiarity with threat intelligence and OSINT methodologies.
What we offer:
  • performance-based bonus
  • equity
  • a generous benefits program

Additional Information:

Job Posted:
January 04, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Staff Security Investigation Analyst

SOC Analyst – Intermediate

Under the general direction of the management team and senior staff, Security Op...
Location
Location
United States
Salary
Salary:
Not provided
revelit.com Logo
Revel IT
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Typically has a 4-year academic degree and 2+ years of information security or equivalent practical work experience
  • Demonstrates and applies thorough understanding of information technology tools, best practices, and concepts
  • Completes on-going training on-the-job, through courses, self-study, certifications and/or advanced degrees to maintain and enhance technical and business capabilities
  • Maintains current knowledge of security techniques and technologies and applies that knowledge to mitigate risk
  • Participates in an On-Call Team rotation
  • Previous experience with some of the following security technologies: Security information and event management (SIEM), Endpoint Detection and Response (EDR), Anti-Virus, IDS/IPS, and NGFW solutions
  • Knowledge of tactics attackers are using while continuing to monitor for new tactics and procedures being utilized
Job Responsibility
Job Responsibility
  • Provide service to IT client community, patients, families and visitors, while protecting the integrity and confidentiality of all data and information through physical and electronic measures
  • Monitor and investigate security alerts to detect malicious activity that originate from the SIEM, NGFW, EDR, NGAV, etc
  • Follow incident specific playbooks and procedures documented by SOC leadership while investigating and responding to malicious activity
  • Maintain accurate notes in the case management system
  • Proactively identify and remediate threats occurring in the environment by demonstrating the ability to hunt in SIEM and EDR solutions
  • Provide on-call support at designated times in accordance with the policies and procedures of the Health System
  • Collaborate with the team and answer any questions that other analysts may have
  • Assist in the training of new team members
  • Assist in investigating alerts escalated by associate level staff members
  • Work independently to investigate security incidents and alerts
  • Fulltime
Read More
Arrow Right

Infrastructure Senior Technology Analyst

The Infrastructure Senior Technology Analyst is an intermediate level role respo...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6+ years' experience in I.T
  • 5+ years hands-on experience on middleware webhosting and application server products
  • Bachelor's degree in computer science or related field or equivalent combination of education and experience
  • Experience in IT security compliance and implementation and use of security protocols (SSL, Server certificates)
  • Good experience using Java, J2EE, XML, SQL and Shell/Perl/python/PowerShell Scripting in UNIX/Wintel environment
  • Experience in modernization of traditional web/app applications to Redhat Openshift containers & external Cloud
  • Reasonable experience with AI tools to automate current pain points in workflow
  • Familiarity with Compliance and risk management frameworks and methodologies (ISO27002, SDLC)
  • Initiative and ability to perform under pressure
  • Strong leadership, interpersonal and communication skills
Job Responsibility
Job Responsibility
  • Create complex project plans and perform impact analyses
  • Solve/work high impact problems/projects and provide resolutions to restore services
  • Drive Root Cause Analysis (RCA) post restoration of service
  • Design testing approaches, complex processes, reporting streams, and create automation of repetitive tasks
  • Review requirement documents, define hardware requirements and examine and update processes and procedures
  • Provide technical/strategic direction and act as advisor/coach to lower-level analysts
  • Develop projects required for design of metrics, analytical tools, benchmarking activities and best practices
  • Provide expertise in application hosting technologies with specialized emphasis on IBM technologies (WebSphere/WebLogic Application Server, WebLogic Forms and Reports, IHS)
  • Provide expertise in other web hosting technologies like Microsoft IIS, Apache, Tomcat
  • Provide expertise in Java/J2EE deployments and Operating system scripting
  • Fulltime
Read More
Arrow Right

Staff Physical Security Analyst

The Staff Physical Security Analyst will protect AlphaSense’s people, facilities...
Location
Location
United States , New York or Chicago
Salary
Salary:
113000.00 - 156000.00 USD / Year
alpha-sense.com Logo
AlphaSense
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in physical security, corporate security, or related fields, in a technology, financial services, or similarly fast-paced environment
  • Strong expertise in security technologies (e.g., Lenel, Genetec, Verkada, or similar access control and VMS platforms)
  • Experience with emergency response planning, crisis management, and security incident response
  • Strong analytical, investigative, and documentation skills
  • Ability to manage multiple global sites and remote collaboration effectively
  • Experience with executive protection, travel security, or personnel security programs
  • Understanding of how physical access intersects with logical/IT access governance
  • experience supporting access reviews or JML processes
  • Comfortable with technology: you can navigate integrations, reporting tools, and dashboards
  • Ability to partner effectively with investigative or insider threat teams on converged security matters
Job Responsibility
Job Responsibility
  • Oversee physical security systems, including access control, video surveillance, and alarm monitoring
  • Conduct site security risk assessments and recommend mitigation measures
  • Manage and optimize global access provisioning processes in coordination with IT and Facilities
  • Lead physical security investigations
  • Collaborate with building management, HR, Legal, IT and regional operations to ensure consistent security standards
  • Lead executive and personnel protection efforts
  • Own vendor and integrator relationships for physical security services and technologies
  • Develop and maintain physical security policies, procedures, and incident reporting frameworks
  • Support workplace violence prevention programs
  • Provide physical security data and investigative support to insider threat investigations
What we offer
What we offer
  • Competitive compensation, benefits, and the opportunity to shape security at a high-growth company
  • performance-based bonus
  • equity
  • generous benefits program
  • Fulltime
Read More
Arrow Right

Sr. Cybersecurity Incident Response Analyst

Blue Yonder, a leading supply chain software company, is seeking a Sr Cybersecur...
Location
Location
Mexico , Monterrey; Mexico City
Salary
Salary:
Not provided
blueyonder.com Logo
Blue Yonder
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or related equivalent experience
  • 5+ years of experience in information security or cybersecurity as an analyst, engineer or consultant
  • MUST have experience with incident response methodologies and tools (e.g. SANS IR, EDR, SIEM, Threat Intelligence, etc.)
  • Strong technical skills and attention to detail
  • Excellent verbal and written communication skills
  • Ability to work independently and as part of a team
  • Ability to work under pressure and in a fast-paced environment
  • Strong problem-solving skills and a proactive approach to work
  • Knowledge of security frameworks such as NIST and ISO 27001
  • Familiarity with security regulations and standards (e.g. PCI DSS, HIPAA, etc.)
Job Responsibility
Job Responsibility
  • Monitor and Analyze Security Alerts – Review alerts generated by security systems, appliances, and logs to determine the appropriate course of action to protect the enterprise and reduce overall risk
  • Incident Triage and Response – Quickly assess, prioritize, and respond to security incidents, ensuring timely containment, eradication, and recovery to minimize business impact
  • Root Cause Analysis (RCA) – Investigate security incidents to determine root causes, attack vectors, and vulnerabilities, providing recommendations to reduce the attack surface and prevent recurrence
  • Threat Hunting and Proactive Defense – Conduct proactive threat-hunting activities based on intelligence, anomalies, and adversary tactics to identify and mitigate threats before they escalate
  • Collaboration with Cross-Functional Teams – Work closely with IT, engineering, legal, compliance, and other teams to coordinate incident response efforts and ensure an effective security posture
  • Incident Documentation and Reporting – Maintain detailed documentation of security incidents, response actions, and lessons learned, ensuring continuous improvement in security processes
  • Develop and Improve Incident Response Playbooks – Enhance and maintain incident response procedures, ensuring alignment with industry best practices and emerging threats
  • Security Awareness and Training – Provide guidance, training, and mentorship to SOC analysts and IT staff on security threats, incident handling, and response best practices
  • Threat Intelligence Integration – Leverage threat intelligence sources to stay informed on evolving cyber threats and proactively adjust security strategies to defend against them
  • Fulltime
Read More
Arrow Right

Management Analyst, Journeyman

This position will perform full life cycle program management in the areas of in...
Location
Location
United States , St. Inigoes
Salary
Salary:
60000.00 - 63750.00 USD / Year
kairosinc.net Logo
KAIROS Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in an engineering, technical, business, or other related discipline
  • Three (3) or more years of related experience
  • Demonstrated ability to successfully work with large and diverse teams
  • Ability to effectively provide guidance, direction, and supervision in acquisition
  • Demonstrated ability to initiate and plan projects and generate deliverables, processes, direct execution, and collaborate with customers and staff
  • Strong customer relations, analytics, documentation skills
  • Self-starter, highly motivated, strong work ethic with a commitment to quality
  • Microsoft office suite proficiency, i.e., Word, Excel, PowerPoint
  • Ability to work within a challenging, fast-paced, team-oriented environment
  • Ability to work independently
Job Responsibility
Job Responsibility
  • Support IPT activities, and produce detailed reports used by the team and management
  • Tailor standard tools to best support specific project reporting, continuous analysis, complex problem-solving, and rebalance requirements throughout the duration of assigned projects
  • Provide budget execution support, financial documentation, and monitoring
  • Translating technical requirements into acquisition documentation within prescribed formats and standards considering systems requirements and constraints
  • Status reporting, continuous analysis, complex problem-solving, and developing recommendations to improve efficiency and performance
  • Report financial status of overall program/project obligations, and commitments with a focus on reconciliation of unliquidated balances and data errors in Navy ERP
  • Support reconciliation process assessments and analyses to increase overall effectiveness, efficiency, quality, and cost performance
  • Provide analysis to increase overall effectiveness, efficiency, quality and cost of performance
  • Report financial status of overall tactical level project obligations, commitments, and expenditures
  • Support business process assessments and analyses to increase overall effectiveness, efficiency, quality, and cost performance
What we offer
What we offer
  • Medical Coverage
  • Employer Paid Dental, Vision, Basic Life/AD&D, Short-Term/Long-Term Insurance
  • Health Savings Account with Contribution by Employer
  • 401K Plan with Employer Matching
  • Annual Discretionary Bonuses
  • Paid Time Off
  • Eleven (11) Paid Holidays
  • Certification reimbursement program
  • Tuition Reimbursement Program
  • Paid Parental Leave
  • Fulltime
Read More
Arrow Right

Information Security Analyst

To be part of PA Group Systems Security Operations Centre team, providing in-dep...
Location
Location
United Kingdom , Melbourn
Salary
Salary:
Not provided
paconsulting.com Logo
PA Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years of proven technical experience across multi-disciplinary IT fields or equivalent relevant education
  • Good attention to detail, well organised and capable of working under pressure
  • Strong log analysis and correlation skills
  • Knowledge of Logging/SIEM systems
  • Knowledge of Data Leak Prevention systems
  • Knowledge of Intrusion Detection systems
  • Ability to communicate at all levels
  • Ability to work effectively as part of a team
Job Responsibility
Job Responsibility
  • Review daily security system logs and alerts - Firewall/Intrusion Detection System/Data Leak Prevention/Endpoint Detection and Response – and identify security issues
  • Provide insight into the countermeasures PA should adopt and generate key performance indicator metrics for the security board
  • Works as a technical resource in security related projects
  • Perform forensic analysis as required
  • Working with operational teams, ensure vulnerabilities are resolved
  • Review security bulletins for threats. Liaise with key security firms reviewing threat reports
  • Provide out of hours On-Call availability and response to high severity incidents (usually 1 week per month – paid)
  • Work closely with the SOC Manager and Director of Cyber Security
  • Work with GS operational staff who require assistance with technical security issues
  • Interface with the rest of Group Systems on new projects/support functions undertaken
What we offer
What we offer
  • Health and lifestyle perks accompanying private healthcare
  • 25 days annual leave (plus a bonus half day on Christmas Eve) with the opportunity to buy 5 additional days
  • Generous company pension scheme
  • Opportunity to get involved with community and charity-based initiatives
  • Annual performance-based bonus
  • PA share ownership
  • Tax efficient benefits (cycle to work, give as you earn)
  • Fulltime
Read More
Arrow Right

Information Security Analyst

The Information Security Analyst will plan and carry out security measures to pr...
Location
Location
Canada , Mississauga
Salary
Salary:
72000.00 - 80000.00 CAD / Year
pointclickcare.com Logo
PointClickCare
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Proven experience with security software, such as: SIEM, Vulnerability Scanning, Advance Endpoint Protection (Anti-virus/Anti-Malware), Privilege Access Management, Data Loss
  • Working technical knowledge of IT technical environments with a strong understanding of IP, TCP/IP, network administration protocols, Access Control methods, WAFs, Firewalls, and virtualized access control solutions (e.g., Network Security Groups)
  • Understanding/working knowledge of Windows, Active Directory, Group Policy, DNS, and Apple operating systems
  • Extensive working knowledge of information security and vulnerabilities/threats, security best practices, tools, and techniques, including encryption
  • Experience working with Python and PowerShell Experience in managing/administering Linux OS variants, PowerShell, bash/shell scripting, python
Job Responsibility
Job Responsibility
  • Primary point of contact to facilitate with the daily monitoring, assessing and reporting of security incidents from the SIEM platform
  • Manage processes relating to the installation, maintenance and operation of security infrastructure including SIEM, anti-virus, DLP, PAM, IAM, etc
  • Perform ad hoc threat risk assessment (TRA) on infrastructure and systems as well as cloud-based solutions and facilitate remediation tasks with other operational teams
  • Work independently, and with the team, to determine new methods of automating existing workflows (e.g., through the use of AI tools, automation frameworks, and workflow management solutions)
  • Assist with ongoing Vulnerability Management program to perform routine vulnerability scans and working closely with SaaS Operations and Corporate Technology teams to coordinate remediation of identified findings
  • Assist with the evaluation of security tools and processes in conjunction with Director, Security Operations
  • Recommend improvements to security tools, configurations, processes and policies
  • Report monthly security KPIs, change requests, incidents and threats/events
  • Provide advice and apply your experience to help tune alerting to reduce false positives
  • Actively assist with Security Incident Response process and support security investigations by documenting findings and root causes as and when needed, research and assess new threats and security alerts and determining relevance to company environments and staff
What we offer
What we offer
  • Benefits starting from Day 1
  • Retirement Plan Matching
  • Flexible Paid Time Off
  • Wellness Support Programs and Resources
  • Parental & Caregiver Leaves
  • Fertility & Adoption Support
  • Continuous Development Support Program
  • Employee Assistance Program
  • Allyship and Inclusion Communities
  • Employee Recognition
  • Fulltime
Read More
Arrow Right

Security Governance Analyst

As a Technology Security Governance Analyst, you will support and manage element...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
fortnumandmason.com Logo
Fortnum & Mason
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience of security and compliance standards frameworks such as ISO 27001, ISO 22301, GDPR, PCI-DSS, NIST, and ACPO guidelines
  • Understanding of UK legal frameworks including the Data Protection Act and Computer Misuse Act
  • Understanding of Microsoft infrastructure including Windows Server Administrator, Active Directory AAD Administrator, Group Policy, and Microsoft 365 services and Azure Cloud resource management
  • Microsoft SQL Server
  • PowerShell scripting
  • Identity & Access Management (IAM), Expertise in Microsoft Entra ID (formerly Azure AD), role-based access control (RBAC), and multi-factor authentication (MFA)
  • Cloud Security, Experience securing Azure environments, including Microsoft Defender for Cloud, Sentinel, and compliance frameworks like PCIDSS
  • Threat Protection & Incident Response: Ability to identify vulnerabilities, implement threat protection, and respond to security incidents
  • Patch Management & Endpoint Security: Understanding of patching, importance of regular updates, patching, and endpoint protection across Windows and Azure environments
  • Familiarity with backup and disaster recovery tools and practices
Job Responsibility
Job Responsibility
  • Own and manage the process for third party information security assurance to ensure that ongoing security assessments are undertaken and that contractual agreements reflect information security requirements
  • Support information security awareness throughout the organisation including managing phishing awareness campaigns and delivering and supporting training and awareness to specific user groups
  • Support management and investigation of any information security incidents including ensuring that incident logs are maintained, and any actions / lessons learned are addressed
  • Support Fortnum & Masons PCI compliance program including ensuring evidence of compliance is collated and maintained and undertaking audit checks within stores
  • Manage the process for Information Security Risk Management to ensure that all information security risks are owned and documented and remediated to an agreed and accepted level
  • Support the process for project engagements to ensure that Information Security requirements are defined for each project, Architectural design documents are reviewed to ensure appropriate controls are in place and testing and acceptance processes are in place to ensure that agreed controls have been implemented
  • Serve as a hands-on Security Analyst, proactively identifying opportunities for improvement and delivering security enhancements to our systems
  • Collaborate with partners to ensure the security of the Cisco Meraki network, taking an initiative-taking stance in mitigating risks and initiative-taking patch management
  • Assist with internal and external vulnerability assessments, working with security partners to maintain PCIDSS compliance, overcome security challenges, and drive continuous improvements align to the NIST framework/ISO271002 standards
  • Report and review our secure device imaging using Microsoft Intune & Autopilot, ensuring a standardized, scalable, and resilient setup for retail, hospitality POS, and all corporate end user devices
What we offer
What we offer
  • A generous store and restaurant discount of up to 40%
  • 25 days holidays (excluded bank holidays) and an extra day off for your birthday
  • A fantastic subsidised staff restaurant which uses Fortnum’s ingredients
  • A range of opportunities to develop and grow personally and professionally
  • Excellent pension scheme
  • Fulltime
Read More
Arrow Right