CrawlJobs Logo

Forensic Analyst

https://www.soprasteria.com Logo

Sopra Steria

Location Icon

Location:
Canada , Montréal

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Join the international Cyber Security Operations Center (SOC) as a Forensic Analyst, where you’ll play a key role in computer forensic investigations, data recovery, and incident response. You’ll be part of a 24x7 SOC RUN Team, reporting to the SOC Run Lead, and collaborating with global cyber security experts.

Job Responsibility:

  • Lead and execute incident response missions to determine the cause and extent of security incidents
  • Conduct forensic investigations and electronic discovery for the cyber security group and legal department, using advanced forensic tools and proprietary methodologies
  • Manage and participate in forensic incident response missions (networks, systems, malware analysis, etc.)
  • Support the DFIR manager by communicating assignment progress and issues
  • Participate in Cyber Defense Center collaboration, projects, and compliance efforts related to CERT matters
  • Maintain a computer forensic lab and support SOC incident investigation activities
  • Contribute to advanced threat hunting and the enhancement of cybersecurity detection and response maturity

Requirements:

  • Proficiency with Windows, Macintosh, Linux/UNIX, and DOS operating systems
  • Strong understanding of information systems security, network architecture, and general database concepts
  • Experience with forensic tools (e.g., EnCase, FTK, Magnet Axiom), security assessments, penetration testing, and ethical hacking
  • Ability to conduct exams on compromised computers and servers, and perform live network analysis
  • Excellent written and oral communication skills
  • Ability to manage multiple projects, work under pressure, and maintain confidentiality
  • Experience managing client relationships, forensic cases, and corporate incidents
  • Relevant cybersecurity certifications (GCFA, CIH, GCFE, GCIA) are required
  • Professional proficiency in English (oral and written)

Nice to have:

  • Experience in the transport/shipping/logistics sector is a plus
  • Autonomy and proactive behavior
  • Excellent communication and analytical skills
  • Desire to engage with people and enable their success
  • Ability to work in an international environment with offshore personnel
  • Discretion regarding sensitive matters
What we offer:
  • Competitive salary and annual performance bonus
  • Comprehensive benefits package: life insurance, long-term disability, health care, dental, vision, and a health spending account to support your well-being (Sopra Steria covers 100% of premiums)
  • Paid time off: sick leave, personal days, and 3 weeks of vacation
  • Monthly transportation allowance
  • Excellent training, development, and career advancement opportunities, with active support to strengthen your skills in a caring, collaborative, and inclusive company culture
  • Hybrid work environment
  • Provided equipment to ensure optimal productivity

Additional Information:

Job Posted:
January 20, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Forensic Analyst

Cyber Security-Fraud Analyst

The L2 Support Fraud Detection Senior Analyst is a pivotal team member responsib...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Tools: Octoflow, Mosaic
  • conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
Job Responsibility
Job Responsibility
  • Conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
  • collaborate with cross-functional teams for swift containment, investigation, and recovery
What we offer
What we offer
  • Inclusive and respectful work environment
  • positions open to people with disabilities.
  • Fulltime
Read More
Arrow Right

Security Threat Intelligence and Hunting Analyst

The Security Threat Intelligence and Hunting Analyst role at NTT DATA involves a...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Job Responsibility
Job Responsibility
  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Fulltime
Read More
Arrow Right

Security Threat Intelligence and Hunting Analyst

As a Security Threat Intelligence and Hunting Analyst, you will analyze and dete...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in computer science, information technology or security or related field
  • Relevant security certification(s) such as GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), and GIAC Certified Forensic Analyst (GCFACTIA, CompTIA Cybersecurity Analyst (CySA+), GCTI, FOR508 preferred
  • Seasoned demonstrated experience in a similar role
  • Seasoned demonstrated experience gained within a global technology organization
  • Ability to apply critical thinking skills to a situation and make a decision based on the information to hand
  • Good understanding of computer systems, software and technology in general
  • Excellent written and verbal communication
  • Ability to research topics and find information relevant to their work
  • Ability to interpret large amounts of data and identify important details to identify potential threats and vulnerabilities
  • Seasoned proficiency in threat hunting methodologies, including familiarity with tools and techniques for proactive detection of threats
Job Responsibility
Job Responsibility
  • Reads reports, makes risk assessments, works to detect the source of attacks and tests current defenses against threats
  • Advises on analysis enabling organization to make decisions on how to improve security measures and respond to attacks
  • Monitors security alerts and maintains awareness of new threats and vulnerabilities in order to identify potential risks
  • Analyses data from various sources, including network traffic, email logs, malware files, web server logs, DNS records, etc. to identify cybersecurity risks
  • Develops and maintains threat intelligence databases containing information about cybercrime tactics, techniques, and procedures (TTPs) used by hackers or other actors targeting the organization’s assets
  • Participates in Incident Response activities as necessary to identify and contain new threats
  • Conducts investigations into potential threats by collecting data from multiple sources and analyzing it to identify patterns or other significant pieces of information that indicate a specific threat may be occurring or has occurred previously
  • Communicates with senior leaders and also executives and other stakeholders on security matters to raise awareness of potential risks and recommend solutions
  • Conducts regular audits of security measures to identify vulnerabilities that could be exploited by unauthorized users
  • Reviews security policies to ensure compliance with industry regulations and best practices
  • Fulltime
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst. Use information co...
Location
Location
United States , Harlem, GA; Annapolis Junction, MD
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area (e.g., JCAC, UCT, NWBC/INWT, Cyber Defense Operations) may count toward experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K sign-on bonus after six-months on contract
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst in Annapolis Juncti...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area such as JCAC, UCT, NWBC/INWT, Cyber Defense Operations can count towards experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K SIGN-ON BONUS AFTER SIX-MONTHS ON CONTRACT
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right

Exploitation Analyst 3

We are looking for an Exploitation Analyst with experience in computer or inform...
Location
Location
United States , Central Maryland
Salary
Salary:
141000.00 - 184000.00 USD / Year
realmone.com Logo
RealmOne
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in computer or information systems design/development/analysis roles
  • Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Associate’s degree with 10 years of experience
  • Bachelor’s degree with 8 years of experience
  • Master’s degree with 6 years of experience
  • PhD with 4 years of experience
  • Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an associate’s degree
  • Position requires Active Security Clearance with appropriate Polygraph
Job Responsibility
Job Responsibility
  • Apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution
What we offer
What we offer
  • Healthcare Coverage + Insurance: Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
  • Tax-advantaged health savings account available with generous employer contribution
  • Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available
  • Retirement + Savings: 401K – 10% TOTAL CONTRIBUTION – 5% safe harbor – 5% annual profit share (both immediately vested!)
  • Paid Time Off + More: 4 weeks starting PTO – 11 federal holidays + 2 floating holidays – Paid hours for company-required training
  • Career Growth + Development: Access to FREE 24/7 learning via Udemy – Opportunities to participate in tech councils, industry initiatives, etc. – $7,500 annual Educational & Professional Development Assistance
  • Paid parental leave
  • Annual swag drops
  • Flexible work schedules
  • Generous referral bonus program
  • Fulltime
Read More
Arrow Right