CrawlJobs Logo

Asset Protection Investigations Analyst

anntaylor.com Logo

Ann Taylor

Location Icon

Location:
United States , Hingham

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

66300.00 - 70000.00 USD / Year

Job Description:

The ASSET PROTECTION INVESTIGATIONS ANALYST is responsible for conducting store-related investigations across all KnitWell brands. Reporting to the Manager of Store Analysis & Investigations, this role supports investigative analytics and provides actionable insights to assist field teams and their interviews. The analyst will leverage knowledge of the retail landscape to perform comprehensive risk assessments, review transactions to prevent fraud, and partner with Asset Protection leaders on in-depth investigations. This individual should be experienced in standardizing processes and comfortable analyzing complex datasets to drive informed decisions.

Job Responsibility:

  • Support fraud investigations by gathering data, performing analytics, and preparing reports in partnership with Regional Asset Protection leaders
  • Assist in maintaining and following standardized investigation processes to ensure consistency and accuracy
  • Utilize company-provided tools and resources to identify, track, and document internal losses
  • Conduct transaction reviews and risk assessments to help minimize store-level losses
  • Prepare detailed investigative summaries and provide insights to support interviews and decision-making
  • Stay informed on retail industry trends and best practices relevant to fraud and asset protection
  • Collaborate with internal partners to ensure timely communication and responsiveness to business needs
  • Translate investigative findings into actionable recommendations for field teams and leadership
  • Contribute to continuous improvement initiatives by identifying process gaps and suggesting enhancements
  • Generate periodic and ad-hoc reports to support leadership and executive management
  • Maintain confidentiality and integrity in all investigative activities

Requirements:

  • Bachelor’s degree or equivalent experience preferred
  • Proficient in analyzing data, identifying patterns, and drawing actionable insights to enhance AP strategies
  • Familiar with Asset Protection reporting platforms for use of investigations
  • Excellent problem solving analytical and investigative skills, detail-orientation, independent thinking, and organizational skills
  • Strong verbal and written communication skills and strong interpersonal skills with the ability to clearly provide investigation reports to peers
  • 2+ years of data analytics, preferably focused on fraud risk
  • Proficiency with MS Office suite (excel, word & PowerPoint a must)
What we offer:
  • Merchandise discount at select KnitWell Group brands
  • Support for individual development plus opportunities for career mobility within our family of brands
  • A culture of giving back – local volunteer opportunities, annual donation and volunteer match to eligible nonprofit organizations, and philanthropic activities to support our communities
  • Medical, dental, vision insurance & 401(K)
  • Employee Assistance Program (EAP)
  • Time off – paid time off & holidays

Additional Information:

Job Posted:
April 01, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Asset Protection Investigations Analyst

Agent Investigator Asset Protection

At Abercrombie & Fitch, quality is in our roots and we’re on a mission to honor ...
Location
Location
United States , Houston
Salary
Salary:
Not provided
corporate.abercrombie.com Logo
Abercrombie and Fitch Co.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4-year degree preferred
  • Experience and/or interest in Asset Protection, multi-location experience preferred
  • Strong communication and interpersonal skills
  • Ability to evaluate circumstances and make timely decisions based on company apprehension guidelines
  • Ability to work nights, evenings and weekends appropriate to retail business needs
  • Must pass a comprehensive background investigation
  • Must have a reliable means of transportation
Job Responsibility
Job Responsibility
  • Responsible for the execution of Asset Protection initiatives in assigned locations 5-10 stores, as well as, implementation of shortage reduction programs in high shrink location(s)
  • Provide in person and remote support to local store management to meet strategic asset protection objectives
  • Perform operational audits of store districts within the Company focusing on sales floor fullness, stockroom organization, health and safety, human resources compliance and customer service
  • Routine monthly travel to Focus Stores. Manage Focus Store program to ensure store compliance, and follow up on sub-standard performers
  • Provide clear and consistent training to all store personnel on Asset Protection Initiatives. safety communication guidelines and current crisis management protocols
  • Commit to the highest degree of professionalism, integrity, and customer service
  • Complete AP and Physical Security audits on a routine basis.
  • Complete special projects as assigned by Regional Manager of Asset Protection.
  • Optimize inventory accuracy through effective execution and management of physical inventories, store transfer monitoring and OMNI compliance.
  • Facilitate supply chain investigations to positively impact inbound carton loss and forced carton compliance.
What we offer
What we offer
  • Incentive bonus program
  • 401(K) savings plan with company match
  • Annual companywide review process
  • Flexible spending accounts
  • Medical, dental and vision insurance
  • Life and disability insurance
  • Associate assistance program
  • Paid parental and adoption leave
  • Access to fertility and adoption benefits through Carrot
  • Access to mental health and wellness app, Headspace
  • Fulltime
Read More
Arrow Right

Cyber Defence Analyst

We are seeking a Cyber Defence Analyst to join our Cyber Security Operations Cen...
Location
Location
India , Pune
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 3 years of experience in Cyber Security, SOC operations, SIEM technologies, and incident management
  • Strong understanding of networking and security concepts, with hands-on experience in SIEM tools such as ArcSight, Splunk, QRadar, or LogRhythm
  • Industry-recognised certifications such as CEH, CCNA Cyber Ops, or Security+
  • Excellent analytical and communication skills, with the ability to follow defined triage playbooks
  • Knowledge of cybersecurity threats, attack techniques, and operational monitoring of security events
  • Degree in Computer Science, Information Technology, Engineering, or equivalent
  • Experience in global customer handling and a reputation for integrity and cultural sensitivity
Job Responsibility
Job Responsibility
  • Act as a frontline cyber defender, ensuring protection of digital assets from unauthorised access
  • Investigate, analyse, and triage security alerts using CSOC tools and processes
  • Document event analysis and maintain case ownership until closure
  • Perform historical analysis of detected events and support incident managers during critical situations
  • Participate in daily stand-up calls and contribute to knowledge base articles
  • Collaborate with global CSIRT teams for ongoing cases and document SOPs and processes
  • Proactively work on alert reduction and process stabilisation
  • Ensure mitigation measures for spam and phishing alerts
  • Communicate effectively about threats, malware behaviour, and risks to business stakeholders
What we offer
What we offer
  • Opportunity to work in a global 24/7 Cyber Security Operations Centre
  • Exposure to advanced security tools and technologies
  • Collaborative environment with global teams and industry experts
  • Continuous learning and development in cybersecurity trends and practices
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Risk & Compliance Analyst

The Senior Cybersecurity Risk & Compliance Analyst is responsible for executing ...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
kennametal.com Logo
Kennametal
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in information security, Information Systems, Computer Science, or related field
  • 5–8 years of experience in cybersecurity risk management, GRC, or enterprise risk roles
  • Demonstrated hands-on experience conducting formal cybersecurity risk assessments
  • Working knowledge of major cybersecurity frameworks (NIST RMF, NIST CSF, ISO 27001)
  • Strong written and verbal communication skills with the ability to brief technical and non-technical audiences
Job Responsibility
Job Responsibility
  • Lead structured cybersecurity risk assessments across business, IT, and OT environments
  • Perform qualitative and quantitative risk analysis using recognized methodologies (e.g., NIST 800-30, FAIR, OCTAVE)
  • Maintain cybersecurity risk register entries, including risk statements, impact analysis, likelihood assessments, and remediation tracking
  • Monitor and report the status and effectiveness of risk mitigation plans
  • Develop and present cybersecurity risk status metrics and summaries for leadership review
  • Serve as a subject-matter expert for cybersecurity risk identification and treatment guidance
  • Identify confidentiality, integrity, and availability (CIA) requirements for information assets
  • Support Kennametal’s information classification and data protection programs
  • Provide risk-based input into data protection controls, including Data Loss Prevention (DLP) strategies
  • Advise stakeholders on appropriate handling, labeling, and protection of sensitive data
  • Fulltime
Read More
Arrow Right

Financial Operations Analyst

The Finance Operations Analyst must demonstrate an ability to communicate both w...
Location
Location
United States , New York
Salary
Salary:
42.50 USD / Hour
aus.com Logo
Allied Universal®
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • High School diploma or equivalent (e.g., GED)
  • Licensing requirements are subject to state and/or local laws and regulations and may be required prior to employment
  • No prior work history required
  • Proficient computer skills including Microsoft Office
  • Ability to work in an environment where there is an expectation for constant learning
  • Effective oral and written communication skills
  • Active listening skills
  • Ability to identify critical issues quickly and accurately
  • Acute attention to detail and evaluative thinking skills
  • Problem Solving
Job Responsibility
Job Responsibility
  • Support global financial plans, events and special requests for the Client
  • Track and process invoices for vendors, reconcile final bills, and oversee budget workups and recaps as well as track all in Ariba as needed for accuracy and payment
  • Manage global budget for the client’s multiple programs under the Corporate Security Business Unit
  • Serve as finance support for global budgets, including compiling, and analyzing all financial information
  • Support In the completion of budgetary forecasting based on previous year’s financial information and future projections
  • Special programs - tracking of billing. planning and implementation
  • Assist in preparation and analysis of annual budgets and long-range financial plans/projections
  • Review, track, and process global PO requests ensuring purchases are within budget
  • Maintain quarterly variance
  • Review and verify accuracy of financial and contract paperwork and processes
What we offer
What we offer
  • Medical, dental, vision, basic life, AD&D, and disability insurance
  • Enrollment in our company’s 401 (k) or Supplemental Income Plan, subject to eligibility requirements
  • Eight paid holidays annually, five sick days, and four personal day
  • Vacation time offered at an accrual rate of 3.08 hours biweekly. Unused vacation is only paid out where required by law.
  • Fulltime
Read More
Arrow Right

Information Security Specialist/Analyst III

The Information Security Specialist/Analyst III reports to the Manager, Security...
Location
Location
United States
Salary
Salary:
Not provided
muschealth.org Logo
MUSC Health
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience
  • or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience
  • or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required
  • Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.)
  • Strong analytical and problem-solving skills with the ability to make decisions under pressure
  • Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools
  • Familiarity with cloud security (Azure, AWS) and identity management solutions
  • Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices
  • Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language
  • Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks
Job Responsibility
Job Responsibility
  • Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure
  • Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches
  • Perform cyber security incident handling, tracking and reporting
  • Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts
  • Respond to relevant service requests received from end users (e.g. for investigation of security events)
  • Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents
  • Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities
  • Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements
  • Conduct vulnerability assessments to identify security risks and report findings to system owners
  • Manage workflows to ensure that protected assets are properly assessed in a timely manner
  • Fulltime
Read More
Arrow Right

SOC Analyst

We are seeking a SOC Analyst to strengthen its cybersecurity operations. This ro...
Location
Location
United States , Jersey City
Salary
Salary:
Not provided
https://www.roberthalf.com Logo
Robert Half
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with SIEM tools (Sentinel, AlienVault) and EDR solutions (CrowdStrike, SentinelOne)
  • Strong knowledge of cloud security (AWS, Azure) and DevSecOps tools (Jenkins, GitHub, Kubernetes)
  • Proficiency in network protocols (TCP/IP, DNS, HTTP) and IAM solutions (Okta, Azure AD)
  • Hands-on experience with vulnerability management tools (Nessus, Metasploit)
  • Understanding of compliance frameworks (GDPR, HIPAA, PCI DSS)
  • Strong analytical and problem-solving abilities
  • Excellent communication skills with cross-functional teams
  • Proactive, detail-oriented, and thrives in a fast-paced environment
  • Bachelor's degree in Cybersecurity, IT, or a related field, or equivalent experience
  • 3+ years in SOC/security operations
Job Responsibility
Job Responsibility
  • Monitoring & Incident Response – Analyze security logs, investigate alerts, contain threats, and collaborate with MTDR vendors on SIEM configuration
  • Threat Intelligence & Hunting – Leverage threat intelligence feeds, proactively hunt for security risks, and apply MITRE ATT&CK methodologies
  • Network & Endpoint Security – Secure firewalls, IDS/IPS, VPNs, and manage EDR solutions to protect enterprise assets
  • Cloud & Application Security – Conduct security assessments, enforce best practices in AWS, Azure, and Google Cloud, and automate security measures within CI/CD pipelines
  • IAM & Data Security – Monitor identity and access management (IAM) systems, detect unauthorized access, and implement encryption and DLP policies
  • Compliance & Risk Management – Support audits for GDPR, HIPAA, and NIST compliance while performing internal security checks
  • Reporting & Communication – Generate detailed reports, collaborate with IT, development, and management teams, and contribute to security awareness initiatives
What we offer
What we offer
  • medical, vision, dental, and life and disability insurance
  • eligible to enroll in our company 401(k) plan
  • Fulltime
Read More
Arrow Right

Cyber Security Analyst

The Cyber Security Analyst will play a critical role in protecting Client’s IT a...
Location
Location
Canada , Montreal
Salary
Salary:
Not provided
globalstep.com Logo
GlobalStep
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Security, or related field
  • 2 to 5 years of experience in cybersecurity, preferably in industrial or enterprise environments
  • Strong knowledge of: SIEM tools (e.g., Splunk, Sentinel, QRadar)
  • Endpoint detection and response (EDR)
  • Network and cloud security (Azure, AWS)
  • Incident response and threat intelligence
  • OT/ICS security principles (a strong plus)
  • Relevant certifications preferred (CISSP, CISM, CEH, CompTIA Security+, GIAC)
  • Excellent analytical, communication, and problem-solving skills
  • Proven ability to advise leadership and translate technical security insights into business solutions
Job Responsibility
Job Responsibility
  • Monitor, analyze, and respond to security events using SIEM tools
  • Lead investigations into incidents, ensuring timely containment, eradication, and recovery
  • Perform root cause analysis and implement corrective and preventive actions
  • Develop and maintain playbooks for incident response and escalation
  • Conduct regular vulnerability assessments and coordinate patch management activities
  • Evaluate emerging threats, assess business impact, and propose mitigation strategies
  • Support risk assessments and audits, ensuring compliance with internal and external standards (e.g., ISO 27001, NIST, CIS)
  • Provide expert guidance on security design, architecture, and control implementation
  • Recommend and evaluate tools and technologies for endpoint, network, and cloud protection
  • Work closely with infrastructure and application teams to ensure security is built into all projects
What we offer
What we offer
  • Equal opportunity workplace
  • Affirmative action employer
  • Committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status
  • Fulltime
Read More
Arrow Right

Cybersecurity Expert (SOC & Cloud)

The Security team is excited to welcome a motivated Cybersecurity Expert to help...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
leadtech.com Logo
Leadtech Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
  • Knowledge of Security frameworks such as ISO 27001, NIST, PCI-DSS, OWASP, GDPR
  • Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
  • Deep Knowledge of cybersecurity/technical concepts such as: GNU/Linux systems
  • Microsoft Sentinel and Defender, as well as experience with writing KQL queries
  • Microsoft Azure (Network Security Groups, Recovery Services Vaults, Playbooks and Workbooks)
  • TCP/IP, DNS, and firewalls
  • Python, Bash, and SQL, Java, PHP
  • Familiarity with attack and exploitation techniques involving operating systems, applications, and devices (CISSP, CompTIA, CEH)
  • Understanding of security best practices for data and systems protection
Job Responsibility
Job Responsibility
  • Operate & optimize (and potentially Lead) a Security Operations Center (SOC)
  • Advanced Incident Investigation and Analysis
  • Handling Complex Threats: Investigating high-priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware
  • Deep-Dive Analysis: Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data
  • Cross-Source Correlation: Stitching together fragmented data from SIEM, EDR (Endpoint Detection and Response), and NDR (Network Detection and Response) tools to build a comprehensive picture of the attack
  • Proactive Threat Hunting and Detection Engineering
  • Threat Hunting: Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts
  • Rule Creation & Tuning: Developing custom detection logic and SIEM correlation rules to identify new malicious behavior
  • Reducing False Positives: Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents
  • Incident Response and Containment
What we offer
What we offer
  • Flexible career path with personalized internal training and an annual budget for external learning opportunities
  • Flexible schedule with flextime (7 - 9:30 a.m. start, 3:30 - 6 p.m. end)
  • Free Friday afternoons with a 7-hour workday
  • 35-hour workweek in July and August
  • Competitive salary
  • Full-time permanent contract
  • Top-tier private health insurance (including dental and psychological services)
  • 25 days of vacation plus your birthday off, with flexible vacation options—no blackout days
  • Office in Barcelona complete with free coffee, fresh fruit, snacks, a game room, and a rooftop terrace with stunning Mediterranean views
  • Ticket restaurant and nursery vouchers, paid directly from your gross salary
  • Fulltime
Read More
Arrow Right