This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Staff Security Investigation Analyst will lead internal investigations related to insider threats, data loss, policy violations, and security incidents. Beyond reactive casework, this role will proactively identify behavioral indicators and anomalies that may signal insider risk, partnering with detection teams to continuously improve our investigative and monitoring capabilities. You'll work cross-functionally with Legal, HR, Security Operations, IT, and Engineering to ensure investigations are conducted ethically, thoroughly, and with appropriate discretion.
Job Responsibility:
Conduct investigations into insider threats, data exfiltration, IP theft, compliance violations, and policy breaches
Investigate incidents involving sensitive assets specific to our environment: source code, AI/ML models, training data, client intelligence, and research IP
Gather and analyze digital and physical evidence using established forensic methodologies (cloud audit logs, SaaS telemetry, endpoint data, and identity/access records)
Conduct investigative interviews with subjects, witnesses, and stakeholders, applying appropriate techniques for sensitive employment matters
Prepare detailed reports and documentation of investigative findings suitable for executive leadership, legal proceedings, and regulatory inquiries
Collaborate with HR, Legal, and Compliance teams to manage sensitive matters appropriately
Maintain case management systems and ensure confidentiality and chain of custody integrity of investigation data
Develop and enhance investigation protocols, evidence handling standards, and response workflows
Identify patterns, trends, or emerging risks from investigation data and recommend preventive controls, detection improvements, and policy changes
Provide executive-level reporting on investigation trends, program metrics, and risk posture
contribute to tabletop exercises and cross-functional training.
Requirements:
5+ years of experience in corporate investigations, forensics, or incident response
Hands-on experience with insider threat and DLP tooling (e.g., UEBA, E-discovery, SIEM, EDR, Code42, Dtex, Microsoft Purview, or similar)
Proficiency investigating in cloud-native environments (AWS, GCP, Azure) and SaaS platforms
comfortable with audit logs, IAM, and identity-based investigations
Knowledge of employment law, privacy regulations (GDPR, CCPA), and compliance standards
Experience conducting investigative interviews in sensitive employment contexts
Strong communication skills and ability to handle sensitive cases with discretion across all levels of the organization, including executives
Proficiency in case management and e-discovery tools.
Nice to have:
Certifications such as CFE, CFCE, or GIAC-related credentials
Experience in AI, technology, financial services, or market intelligence industries
Background in intelligence analysis, law enforcement, or government insider threat programs
Familiarity with threat intelligence and OSINT methodologies.