CrawlJobs Logo

Forensic Analyst

https://www.soprasteria.com Logo

Sopra Steria

Location Icon

Location:
Canada , Montréal

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Join the international Cyber Security Operations Center (SOC) as a Forensic Analyst, where you’ll play a key role in computer forensic investigations, data recovery, and incident response. You’ll be part of a 24x7 SOC RUN Team, reporting to the SOC Run Lead, and collaborating with global cyber security experts.

Job Responsibility:

  • Lead and execute incident response missions to determine the cause and extent of security incidents
  • Conduct forensic investigations and electronic discovery for the cyber security group and legal department, using advanced forensic tools and proprietary methodologies
  • Manage and participate in forensic incident response missions (networks, systems, malware analysis, etc.)
  • Support the DFIR manager by communicating assignment progress and issues
  • Participate in Cyber Defense Center collaboration, projects, and compliance efforts related to CERT matters
  • Maintain a computer forensic lab and support SOC incident investigation activities
  • Contribute to advanced threat hunting and the enhancement of cybersecurity detection and response maturity

Requirements:

  • Proficiency with Windows, Macintosh, Linux/UNIX, and DOS operating systems
  • Strong understanding of information systems security, network architecture, and general database concepts
  • Experience with forensic tools (e.g., EnCase, FTK, Magnet Axiom), security assessments, penetration testing, and ethical hacking
  • Ability to conduct exams on compromised computers and servers, and perform live network analysis
  • Excellent written and oral communication skills
  • Ability to manage multiple projects, work under pressure, and maintain confidentiality
  • Experience managing client relationships, forensic cases, and corporate incidents
  • Relevant cybersecurity certifications (GCFA, CIH, GCFE, GCIA) are required
  • Professional proficiency in English (oral and written)

Nice to have:

  • Experience in the transport/shipping/logistics sector is a plus
  • Autonomy and proactive behavior
  • Excellent communication and analytical skills
  • Desire to engage with people and enable their success
  • Ability to work in an international environment with offshore personnel
  • Discretion regarding sensitive matters
What we offer:
  • Competitive salary and annual performance bonus
  • Comprehensive benefits package: life insurance, long-term disability, health care, dental, vision, and a health spending account to support your well-being (Sopra Steria covers 100% of premiums)
  • Paid time off: sick leave, personal days, and 3 weeks of vacation
  • Monthly transportation allowance
  • Excellent training, development, and career advancement opportunities, with active support to strengthen your skills in a caring, collaborative, and inclusive company culture
  • Hybrid work environment
  • Provided equipment to ensure optimal productivity

Additional Information:

Job Posted:
January 20, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Forensic Analyst

Cyber Security-Fraud Analyst

The L2 Support Fraud Detection Senior Analyst is a pivotal team member responsib...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Tools: Octoflow, Mosaic
  • conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
Job Responsibility
Job Responsibility
  • Conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
  • collaborate with cross-functional teams for swift containment, investigation, and recovery
What we offer
What we offer
  • Inclusive and respectful work environment
  • positions open to people with disabilities.
  • Fulltime
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst. Use information co...
Location
Location
United States , Harlem, GA; Annapolis Junction, MD
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area (e.g., JCAC, UCT, NWBC/INWT, Cyber Defense Operations) may count toward experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K sign-on bonus after six-months on contract
Read More
Arrow Right

Computer Network Defense Analyst

Altamira is searching for a Computer Network Defense Analyst in Annapolis Juncti...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Completion of military training in a relevant area such as JCAC, UCT, NWBC/INWT, Cyber Defense Operations can count towards experience
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Clearance: TS/SCI w/Full Scope Poly
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • $20K SIGN-ON BONUS AFTER SIX-MONTHS ON CONTRACT
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right

Exploitation Analyst 3

We are looking for an Exploitation Analyst with experience in computer or inform...
Location
Location
United States , Central Maryland
Salary
Salary:
141000.00 - 184000.00 USD / Year
realmone.com Logo
RealmOne
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in computer or information systems design/development/analysis roles
  • Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Associate’s degree with 10 years of experience
  • Bachelor’s degree with 8 years of experience
  • Master’s degree with 6 years of experience
  • PhD with 4 years of experience
  • Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an associate’s degree
  • Position requires Active Security Clearance with appropriate Polygraph
Job Responsibility
Job Responsibility
  • Apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution
What we offer
What we offer
  • Healthcare Coverage + Insurance: Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
  • Tax-advantaged health savings account available with generous employer contribution
  • Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available
  • Retirement + Savings: 401K – 10% TOTAL CONTRIBUTION – 5% safe harbor – 5% annual profit share (both immediately vested!)
  • Paid Time Off + More: 4 weeks starting PTO – 11 federal holidays + 2 floating holidays – Paid hours for company-required training
  • Career Growth + Development: Access to FREE 24/7 learning via Udemy – Opportunities to participate in tech councils, industry initiatives, etc. – $7,500 annual Educational & Professional Development Assistance
  • Paid parental leave
  • Annual swag drops
  • Flexible work schedules
  • Generous referral bonus program
  • Fulltime
Read More
Arrow Right

Lead IT Threat Hunt Analyst

The Lead IT Threat Hunt Analyst proactively identifies and neutralizes cyber thr...
Location
Location
United States
Salary
Salary:
103700.00 - 134460.00 USD / Year
amtrak.com Logo
AMTRAK
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s Degree in Computer Science, Information Systems, or related field
  • Professional security‐related certifications (e.g. GIAC Certified Forensic Analyst (GCFA), Certified Information Systems Security Professional (CISSP), or equivalent)
  • Enterprise security experience in threat intelligence, investigative and hunt methodologies, detection engineering, security operations and/or incident response
  • Knowledge of Mitre ATT&CK matrices (Enterprise, ICS, Cloud) to map adversary tactics, techniques and procedures (TTPs) and inform structured hunts
  • Knowledge of OS triage artifact analysis and incident investigative methods
  • Strong analytical skills and proficiency with SIEM, EDR, CASB, IDS/IPS, AV, DLP UEBA, FW, and forensic investigative technologies
  • Ability to design and review multi-source correlation queries using Kusto, Kibana and/or Structured query languages, across endpoint, cloud, network, application and identity data
Job Responsibility
Job Responsibility
  • Conduct proactive, intelligence-driven threat hunts to identify adversary activity, cyber risks and anomalies, identifying and investigating potential threats to critical infrastructure and operations
  • Evaluate, analyze and synthesize large quantities of data to uncover anomalous activity capable of introducing risk to Amtrak environments
  • Search for potential vulnerability exploitation, post-compromise activity or security control gaps based on emerging and known adversary tactics, techniques and procedures (TTPs), user behavior, endpoint threat detection, network behavior analytics, machine learning-derived trends and external threat reports
  • Review EDR telemetry, Firewall, IDS/IPS logs, web content filtering logs, net flow device logs, antivirus logs
  • Work closely with other cybersecurity teams (detection engineering, threat intelligence, incident response and security operations) and operational technology service owners to escalate anomalous findings, contribute to detection logic improvements and verify security control implementations
  • Support and participate in formal reporting related to threat hunt findings, implementation of security controls and improvements to Cyber Security Operations processes
  • Capture hunt byproducts indicative of poor cyber hygiene practices, company policy violation or misuse
  • support incident investigations, as needed
  • Participate in the evaluation and recommendation of hardware and software systems that provide security functions
  • Respond and resolve problems, security incidents and forensic investigations, as needed
What we offer
What we offer
  • health, dental, and vision plans
  • health savings accounts
  • wellness programs
  • flexible spending accounts
  • 401K retirement plan with employer match
  • life insurance
  • short and long term disability insurance
  • paid time off
  • back-up care
  • adoption assistance
  • Fulltime
Read More
Arrow Right

Investigation & Forensic Analyst

The Investigation & Forensic Analyst is responsible for identifying exposures to...
Location
Location
United States , San Diego
Salary
Salary:
43.00 - 47.00 USD / Hour
gomillenniumsoft.com Logo
MillenniumSoft Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's Degree in Computer Science, Management Information Systems or related field
  • 1-3 years of experience conducting digital forensics or incident response in a full-time role
  • 1-3 years of experience conducting digital investigations in a corporate or law enforcement role
  • Previous experience with Data Loss Prevention technologies and platforms
  • Previous experience working with Encase and Forensic Toolkit (FTK)
  • Previous experience with Network monitoring tools
  • Incident management training and experience in a large-scale environment
  • In-depth knowledge of Windows operating systems
  • Excellent analytical and problem-solving skills
  • Proven ability to deliver tough messages in a professional manner
Job Responsibility
Job Responsibility
  • Properly acquire, preserve and process electronic data to industry standards
  • Perform forensic analysis on various devices
  • Produce quality evidence-based reports as necessary
  • Cyber incident triage and forensics evaluation for cyber threats
  • Interface effectively in key relationships such as Security Operations, and be able to partner with Legal and HR as necessary
  • Evaluate risk based on questionnaires and draft reports
  • Accountable for setting own work direction and completing work tasks
  • Conduct interviews and provide appropriate reports to key stakeholders which summarize the findings
  • Deliver investigation recommendations and reporting by collecting, evaluating and disseminating accurate and timely intelligence information to appropriate managers
  • Assist with additional projects as needed
  • Fulltime
Read More
Arrow Right

Digital Forensic Incident Response Analyst

The Incident Response Analyst is responsible for managing and enhancing security...
Location
Location
United States of America , Virtual
Salary
Salary:
130000.00 - 153000.00 USD / Year
alight.com Logo
Alight Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of one of these certifications: GCIH, GCIA, GREM, CISSP, Cloud Certifications (AWS/Azure)
  • 5+ years of experience in incident response, security engineering, or related fields
  • Managing high-pressure security incidents with proven effectiveness
  • Possessing deep technical expertise in incident handling frameworks, methodologies, and tools
  • Showcasing good knowledge of cloud infrastructure, Linux environments, and containerization technologies
  • US Citizenship requirements- as this role supports services provided to the federal government and/or a federal government contractor, proof will be required to verify US citizenship status at time of hire
Job Responsibility
Job Responsibility
  • Leading incident investigations, analyzing threats, and coordinating prompt responses to security incidents
  • Developing and refining incident response playbooks, procedures, and tools to enhance overall security measures
  • Collaborating with engineering, security, infrastructure, and leadership teams during security events to ensure effective resolution
  • Conducting post-incident reviews, performing root-cause analysis, and implementing lessons learned to prevent recurrence
  • Improving detection and response capabilities to reduce risks and response times effectively
  • Leveraging threat intelligence to enhance detection signals and security strategies
  • Participating in on-call rotation and working off-shift hours when required during incidents
What we offer
What we offer
  • A variety of health coverage options
  • Wellbeing and support programs
  • Retirement
  • Vacation and sick leave
  • Maternity, paternity & adoption leave
  • Continuing education and training
  • Several voluntary benefit options
  • Fulltime
Read More
Arrow Right