CrawlJobs Logo

Investigation & Forensic Analyst

gomillenniumsoft.com Logo

MillenniumSoft Inc

Location Icon

Location:
United States , San Diego

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

43.00 - 47.00 USD / Hour

Job Description:

The Investigation & Forensic Analyst is responsible for identifying exposures to Client sensitive information through forensic data acquisition, data collection from various platforms, forensic analysis, media preservation, restoration and conversion services. This position must be able to work with a high degree of independence and effectively interact with associates from entry level tech to Executive Vice Presidents. A strong combination of technical understanding, communication and documentation is vital to the success of this role.

Job Responsibility:

  • Properly acquire, preserve and process electronic data to industry standards
  • Perform forensic analysis on various devices
  • Produce quality evidence-based reports as necessary
  • Cyber incident triage and forensics evaluation for cyber threats
  • Interface effectively in key relationships such as Security Operations, and be able to partner with Legal and HR as necessary
  • Evaluate risk based on questionnaires and draft reports
  • Accountable for setting own work direction and completing work tasks
  • Conduct interviews and provide appropriate reports to key stakeholders which summarize the findings
  • Deliver investigation recommendations and reporting by collecting, evaluating and disseminating accurate and timely intelligence information to appropriate managers
  • Assist with additional projects as needed

Requirements:

  • Bachelor's Degree in Computer Science, Management Information Systems or related field
  • 1-3 years of experience conducting digital forensics or incident response in a full-time role
  • 1-3 years of experience conducting digital investigations in a corporate or law enforcement role
  • Previous experience with Data Loss Prevention technologies and platforms
  • Previous experience working with Encase and Forensic Toolkit (FTK)
  • Previous experience with Network monitoring tools
  • Incident management training and experience in a large-scale environment
  • In-depth knowledge of Windows operating systems
  • Excellent analytical and problem-solving skills
  • Proven ability to deliver tough messages in a professional manner
  • Proven ability to act independently and to execute with limited information and ambiguity

Nice to have:

  • Knowledge of other OS's such as IoS and Linux
  • CERT-Certified Computer Security Incident Handler Certification
  • CISSP
  • HCISSP
  • CFCE
  • GCFE
  • GCFA
  • EnCE

Additional Information:

Job Posted:
January 11, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Investigation & Forensic Analyst

Cyber Security-Fraud Analyst

The L2 Support Fraud Detection Senior Analyst is a pivotal team member responsib...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Tools: Octoflow, Mosaic
  • conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
Job Responsibility
Job Responsibility
  • Conduct investigations and reporting using Octoflow and Mosaic platforms
  • provide recommendations based on analytics derived from these tools
  • support secure integration of APIs and web services within fraud detection platforms
  • liaise with developers to validate and enhance security features in applications
  • analyse and correlate logs using SIEM solutions to identify and remediate suspicious activity
  • respond to real-time alerts and participate in threat hunting operations
  • integrate threat intelligence feeds into operational systems
  • regularly update detection mechanisms in response to emerging risks
  • lead and document the resolution of escalated fraud incidents
  • collaborate with cross-functional teams for swift containment, investigation, and recovery
What we offer
What we offer
  • Inclusive and respectful work environment
  • positions open to people with disabilities.
  • Fulltime
Read More
Arrow Right

Lead IT Threat Hunt Analyst

The Lead IT Threat Hunt Analyst proactively identifies and neutralizes cyber thr...
Location
Location
United States
Salary
Salary:
103700.00 - 134460.00 USD / Year
amtrak.com Logo
AMTRAK
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s Degree in Computer Science, Information Systems, or related field
  • Professional security‐related certifications (e.g. GIAC Certified Forensic Analyst (GCFA), Certified Information Systems Security Professional (CISSP), or equivalent)
  • Enterprise security experience in threat intelligence, investigative and hunt methodologies, detection engineering, security operations and/or incident response
  • Knowledge of Mitre ATT&CK matrices (Enterprise, ICS, Cloud) to map adversary tactics, techniques and procedures (TTPs) and inform structured hunts
  • Knowledge of OS triage artifact analysis and incident investigative methods
  • Strong analytical skills and proficiency with SIEM, EDR, CASB, IDS/IPS, AV, DLP UEBA, FW, and forensic investigative technologies
  • Ability to design and review multi-source correlation queries using Kusto, Kibana and/or Structured query languages, across endpoint, cloud, network, application and identity data
Job Responsibility
Job Responsibility
  • Conduct proactive, intelligence-driven threat hunts to identify adversary activity, cyber risks and anomalies, identifying and investigating potential threats to critical infrastructure and operations
  • Evaluate, analyze and synthesize large quantities of data to uncover anomalous activity capable of introducing risk to Amtrak environments
  • Search for potential vulnerability exploitation, post-compromise activity or security control gaps based on emerging and known adversary tactics, techniques and procedures (TTPs), user behavior, endpoint threat detection, network behavior analytics, machine learning-derived trends and external threat reports
  • Review EDR telemetry, Firewall, IDS/IPS logs, web content filtering logs, net flow device logs, antivirus logs
  • Work closely with other cybersecurity teams (detection engineering, threat intelligence, incident response and security operations) and operational technology service owners to escalate anomalous findings, contribute to detection logic improvements and verify security control implementations
  • Support and participate in formal reporting related to threat hunt findings, implementation of security controls and improvements to Cyber Security Operations processes
  • Capture hunt byproducts indicative of poor cyber hygiene practices, company policy violation or misuse
  • support incident investigations, as needed
  • Participate in the evaluation and recommendation of hardware and software systems that provide security functions
  • Respond and resolve problems, security incidents and forensic investigations, as needed
What we offer
What we offer
  • health, dental, and vision plans
  • health savings accounts
  • wellness programs
  • flexible spending accounts
  • 401K retirement plan with employer match
  • life insurance
  • short and long term disability insurance
  • paid time off
  • back-up care
  • adoption assistance
  • Fulltime
Read More
Arrow Right

Staff Security Investigation Analyst

The Staff Security Investigation Analyst will lead internal investigations relat...
Location
Location
United States
Salary
Salary:
113000.00 - 161000.00 USD / Year
alpha-sense.com Logo
AlphaSense
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in corporate investigations, forensics, or incident response
  • Hands-on experience with insider threat and DLP tooling (e.g., UEBA, E-discovery, SIEM, EDR, Code42, Dtex, Microsoft Purview, or similar)
  • Proficiency investigating in cloud-native environments (AWS, GCP, Azure) and SaaS platforms
  • comfortable with audit logs, IAM, and identity-based investigations
  • Knowledge of employment law, privacy regulations (GDPR, CCPA), and compliance standards
  • Experience conducting investigative interviews in sensitive employment contexts
  • Strong communication skills and ability to handle sensitive cases with discretion across all levels of the organization, including executives
  • Proficiency in case management and e-discovery tools.
Job Responsibility
Job Responsibility
  • Conduct investigations into insider threats, data exfiltration, IP theft, compliance violations, and policy breaches
  • Investigate incidents involving sensitive assets specific to our environment: source code, AI/ML models, training data, client intelligence, and research IP
  • Gather and analyze digital and physical evidence using established forensic methodologies (cloud audit logs, SaaS telemetry, endpoint data, and identity/access records)
  • Conduct investigative interviews with subjects, witnesses, and stakeholders, applying appropriate techniques for sensitive employment matters
  • Prepare detailed reports and documentation of investigative findings suitable for executive leadership, legal proceedings, and regulatory inquiries
  • Collaborate with HR, Legal, and Compliance teams to manage sensitive matters appropriately
  • Maintain case management systems and ensure confidentiality and chain of custody integrity of investigation data
  • Develop and enhance investigation protocols, evidence handling standards, and response workflows
  • Identify patterns, trends, or emerging risks from investigation data and recommend preventive controls, detection improvements, and policy changes
  • Provide executive-level reporting on investigation trends, program metrics, and risk posture
What we offer
What we offer
  • performance-based bonus
  • equity
  • a generous benefits program
  • Fulltime
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Lead Fraud Operations Analyst

As the Lead Fraud Operations Analyst at Apollo, you’ll be the hands-on technical...
Location
Location
United States
Salary
Salary:
92000.00 - 125000.00 USD / Year
apollo.io Logo
Apollo.io
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in fraud operations, trust & safety, or security operations roles
  • Strong SQL proficiency (joins, CTEs, aggregates)
  • familiarity with Python and data visualization tools
  • Experience reviewing or debugging application code (Ruby preferred), using tools like Cursor, GitHub Copilot, or IDEs for root-cause exploration
  • Familiarity with payment systems (chargebacks, disputes, ACH) and the associated fraud lifecycle
  • Understanding of fraud detection models and risk-scoring logic
  • experience configuring or auditing rule-based systems
  • Demonstrated ability to lead investigations independently, prioritize in ambiguity, and deliver results across multiple teams
  • Exceptional written and verbal communication skills
  • capable of translating technical detail into operational action
Job Responsibility
Job Responsibility
  • Lead Fraud Operations and Investigations
  • Act as the primary escalation point for complex fraud and abuse investigations across Apollo’s ecosystem
  • Perform root-cause analysis of new exploit behaviors, account takeovers, transactions, and scaled abuse events using data queries (SQL, Python), system logs and testing
  • Conduct forensic investigations into fraud model classifications, rule bypasses, and external abuse tool behaviors
  • Build and maintain investigation frameworks that allow rapid detection and classification of fraud patterns
  • Develop and Optimize Fraud Detection Systems
  • Configure, tune, and evaluate rules-based and model-driven fraud detection systems (e.g., Stripe Radar, Signified, or internal models)
  • Collaborate with Engineering to enhance fraud detection logic and event pipelines
  • identify and close systemic gaps through code- or model-level feedback loops
  • Use Cursor or equivalent AI-assisted dev tools to review Ruby-based backend logic, reverse-engineer fraud actor patterns, and suggest mitigations
What we offer
What we offer
  • equity
  • company bonus or sales commissions/bonuses
  • 401(k) plan
  • at least 10 paid holidays per year, flex PTO, and parental leave
  • employee assistance program and wellbeing benefits
  • global travel coverage
  • life/AD&D/STD/LTD insurance
  • FSA/HSA and medical, dental, and vision benefits
  • Fulltime
Read More
Arrow Right

L2 SOC Analyst

Quzara, a leading Cyber Security Firm, is seeking a highly skilled and experienc...
Location
Location
United States
Salary
Salary:
Not provided
quzara.com Logo
Quzara
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • At least 5+ years of experience in a SOC Analyst role at a SOC/MXDR or MSSP with L2 experience
  • Strong understanding of networking technologies
  • Experience with Microsoft security technologies such as Microsoft Sentinel and M365 Defender
  • Strong understanding of security best practices and incident response procedures
  • Experience with deep threat intelligence
  • Strong proficiency with KQL Queries
  • Strong verbal and written communication skills
  • Strong analytical and problem-solving skills
  • Azure experience working with azure security is a must
  • Experience with scripting languages such as Python, PowerShell, and JavaScript
Job Responsibility
Job Responsibility
  • Monitor and analyze security events utilizing advanced security technologies and tools such as Microsoft Sentinel, Defender technologies, and Log Analytics
  • Utilize deep threat intelligence to identify and investigate potential security threats
  • Respond to and triage security incidents, escalating as necessary
  • Utilize proficiency in KQL Queries to conduct investigations and gain insights into potential security threats
  • Collaborate with other teams to resolve security incidents and improve overall security posture
  • Participate in incident response efforts and assist in forensic investigations, adhering to NIST guidelines
  • Continuously improve security operations through the identification of trends and anomalies
  • Communicate security incidents and findings to stakeholders and management
  • Fulltime
Read More
Arrow Right

Data Analyst for Export Control, Sanctions and Customs Compliance

As part of our Review & Control team you create solution concepts and independen...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree in mathematics, computer science, business informatics or a comparable field of study
  • Some years of professional experience in data analytics, or business intelligence
  • Solid knowledge of data analytics tools (e.g., Excel, PowerBI), as well as databases and programming languages such as SQL, Python, or R
  • Very good know-how of SAP R3, S/4, and SAP GTS and their integration into SD/MM/FI
  • Personality and Working Style: You act analytically, structured, and investigative
  • independent and goal-oriented work is a matter for you
  • a pronounced compliance mindset distinguishes you
  • strong communication and presentation skills are among your strengths
  • Fluent in English
Job Responsibility
Job Responsibility
  • Create solution concepts and independently lead and coordinate various projects to support spot check and review activities on Export Control, Sanctions and Customs Compliance
  • Take responsibility for analyses, conceptual development, and ad-hoc data analytics tasks focused on export control, sanctions, and customs
  • Support Compliance Managers in forensic compliance investigations using IT-based and data model-driven approaches
  • Design and operate a data driven monitoring system to assess the completeness, effectiveness, and efficiency of global compliance processes—including master data and business processes in GTS
  • Assist in the development and operation of global risk monitoring systems, the internal control system (ICS), and other IT tools to ensure compliance
What we offer
What we offer
  • Annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Professional support and possibility to share knowledge and best practices
  • Ongoing development opportunities in a multinational environment
  • Broad access to professional trainings (incl. language courses), conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Fulltime
Read More
Arrow Right