CrawlJobs Logo

Junior Digital Investigations Analyst

pgitl.com Logo

Protection Group International

Location Icon

Location:
United Kingdom , London

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Our Digital Investigations Team is all about social media intelligence. We've been at it for over a decade, honing our skills and becoming true experts globally. We've got experience working with social media platforms, governments, and non-profit organisations - helping them understand and navigate digital threats. Our highly skilled Digital Investigations team works at the cutting edge of digital threat and online harm, helping clients detect and respond. We use innovative technology and have a deep understanding of everything related to social media and online infrastructure. We're not just about the platforms themselves, but also about the behaviours and intent of those who use them for adversarial outcomes, and those they target.

Job Responsibility:

  • Identifying and tracking disinformation campaigns
  • Researching and attributing information operations
  • Investigate state and non-state threat actors
  • Monitor the coordination of real-world harm
  • Map and assess novel TTPs and behaviours
  • Deploy our in-house technical capability on investigations
  • Produce concise and contextualised threat reporting

Requirements:

  • An interest in open-source investigations
  • A fluency in a language other than English is highly desirable
  • The mindset of an investigative journalist, a curious and persistent investigator
  • Knowledge of social media information exploitation techniques
  • A background in political science/ journalism/ data science/ research
What we offer:
  • A diverse and challenging workload across multiple complex projects and investigations
  • A collaborative and supportive team at the forefront of this sphere
  • Clients who get what we do and offer us genuine innovation opportunities
  • A meritocratic environment that promotes career progression and development
  • Niche training to support niche skill sets
  • Hybrid working which allows you to strike the perfect work-life balance

Additional Information:

Job Posted:
December 11, 2025

Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Junior Digital Investigations Analyst

Senior Digital Investigations Analyst

Our Digital Investigations Team work with social media platforms, governments, a...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
pgitl.com Logo
Protection Group International
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in online research, digital investigations, open-source intelligence (OSINT)
  • Experience of mentoring, training, or managing others
  • An ability to build strong relationships with clients and key stakeholders
  • The mindset of an investigative journalist, a curious and persistent investigator
  • The ability to write clear and concise threat assessments
  • A background in political science/ journalism/ data science/ research
Job Responsibility
Job Responsibility
  • Identifying and tracking disinformation campaigns
  • Researching and attributing information operations
  • Investigate state and non-state threat actors
  • Monitor the coordination of real-world harm
  • Map and assess novel TTPs and behaviours
  • Deploy our in-house technical capability on investigations
  • Produce concise and contextualised threat reporting
  • Mentoring and directing Junior Analysts to aid their progression and project delivery
  • Supporting client engagement, interaction and presenting intelligence back to clients
What we offer
What we offer
  • Performance related bonus
  • Life Assurance – 4x your annual salary
  • £45 Monthly cost of living voucher
  • 25 days’ annual leave plus all standard UK public holidays
  • Vitality Healthcare
  • Annual eye care support
  • Cycle to Work Scheme
  • Subsidised gym membership
  • Winter flu vaccination
  • Fulltime
Read More
Arrow Right

Engineer III - Cyber Incident Response

The Engineer III, Cyber Incident Response, is a senior technical role within the...
Location
Location
United States , Conshohocken; Remote
Salary
Salary:
Not provided
cencora.com Logo
Cencora
Expiration Date
March 23, 2026
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent work experience
  • Master’s degree preferred
  • Strong knowledge of incident response methodologies, digital forensics, and adversary tactics
  • Familiarity with security frameworks such as NIST, MITRE ATT&CK, and ISO 27035
  • 5–7 years of progressive experience in cybersecurity, with at least 3 years in incident response or SOC operations
  • Hands-on experience with SIEM, EDR, SOAR, and forensic tools (e.g., Splunk, CrowdStrike, EnCase, Wireshark)
  • Proven ability to investigate advanced threats and coordinate response activities across teams
  • Demonstrated success in mentoring junior analysts and improving SOC processes
  • Strong written and verbal communication skills with the ability to document and present technical findings clearly
Job Responsibility
Job Responsibility
  • Lead the investigation and resolution of complex security incidents, including advanced persistent threats, ransomware, phishing campaigns, and insider activities
  • Perform forensic analysis across endpoints, networks, and cloud environments to identify root causes and scope of compromise
  • Develop and enhance incident response playbooks, runbooks, and detection use cases
  • Collaborate with threat intelligence, vulnerability management, and countermeasures teams to strengthen defenses
  • Escalate high-severity incidents to senior leadership and provide clear, actionable reporting
  • Act as a technical escalation point for Engineer I/II analysts during incident investigations
  • Contribute to red team and purple team exercises to validate and improve response capabilities
  • Participate in after-action reviews and lessons-learned sessions to improve SOC processes
  • Mentor and train junior engineers on incident response best practices and investigative techniques
What we offer
What we offer
  • medical
  • dental
  • vision care
  • comprehensive suite of benefits focusing on physical, emotional, financial, and social aspects of wellness
  • support for working families
  • backup dependent care
  • adoption assistance
  • infertility coverage
  • family building support
  • behavioral health solutions
  • Fulltime
Read More
Arrow Right

Senior Information Security Incident Response Analyst

The Senior Information Security Incident Response Analyst leads complex incident...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in Information Technology, Computer Science, Cybersecurity, or a related discipline (preferred)
  • Relevant GIAC or equivalent certifications such as: GSEC – Security Essentials GCIA – Certified Intrusion Analyst GCIH – Certified Incident Handler
  • Significant hands‑on experience in digital forensics and incident response across host, disk, memory, network, cloud, and mobile environments
  • Advanced experience using SIEM, EDR, IDS/IPS, packet analysis utilities, and forensic toolsets in active investigations
  • Advanced ability to analyze network traffic using tools such as Wireshark or tcpdump to distinguish normal and malicious behavior
  • Experience working in cybersecurity consulting, DFIR services, or equivalent technical security roles
  • Advanced knowledge of digital forensics, including disk and memory image analysis across Windows, Linux, and macOS platforms
  • Strong understanding and experience with network forensics, cloud forensics (Azure, AWS, GCP) and mobile forensics (iOS/Android)
  • Ability to communicate complex technical findings clearly to both technical and non‑technical client stakeholders
  • Strong analytical, critical thinking, and problem‑solving abilities during high‑pressure investigations
Job Responsibility
Job Responsibility
  • Investigates security incidents for clients by performing host, disk, memory, network, cloud, and mobile forensics
  • Conducts detailed artifact analysis across Windows, Linux, and macOS systems and reconstructs event timelines using disk images, memory captures, network data, and cloud logs
  • Guides clients through containment, eradication, and recovery activities, providing clear technical recommendations and communications
  • Acts as a senior escalation point for complex incidents and supports the development and mentoring of junior analysts
  • Participates in an on‑call rotation to support urgent, time‑sensitive incident response needs
  • Completes internal and client project work such as tabletop exercises, IR readiness engagements, environment hardening reviews, and forensic assessments
  • Identifies gaps and weaknesses in client environments and provides recommendations to reduce risk and strengthen posture
  • Produces accurate, concise documentation, including investigation notes, status communications, and final reports
  • Collaborates with global DFIR and cyber defense teams and maintains awareness of current threats, tactics, and forensic methodologies
  • Fulltime
Read More
Arrow Right

SOC Analyst L2

Location
Location
Egypt , Nasr City
Salary
Salary:
Not provided
el-delta.com Logo
El Delta Electronic Systems
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Technology, or related field
  • CCNA/CCNP security, Certified Forensic Computer Examiner (CFCE), Certified Information Systems Security Professional (CISSP) with a focus on digital forensics, or other relevant advanced security certifications highly preferred
  • 3+ years of experience in SOC Analyst role
  • Strong understanding of computer operating systems (Windows, Linux, macOS)
  • Experience with digital forensics and analysis tools and software (e.g., EnCase, FTK, Cellebrite)
  • Experience in advanced threat hunting, and incident response
  • Knowledge of common attack vectors (e.g., phishing, malware, ransomware)
  • Understanding of threat intelligence feeds and data sources
  • Experience with security orchestration and automation platforms (SOAR)
Job Responsibility
Job Responsibility
  • Conduct in-depth analysis of security alerts and incidents escalated from L1
  • Utilize advanced threat intelligence and hunting techniques to identify and investigate sophisticated threats
  • Perform malware analysis and reverse engineering techniques
  • Investigate and analyze network traffic for malicious activity
  • Develop, maintain, and enrich threat intelligence feeds, indicators of compromise (IOCs), and other relevant threat-related data
  • Lead and coordinate incident response activities, including containment, eradication, recovery, and root cause analysis
  • Develop and implement security playbooks and response procedures
  • Collaborate with other IT teams to remediate security vulnerabilities and implement security controls
  • Conduct in-depth digital forensic investigations on compromised systems and networks
  • Collect, preserve, and analyze digital evidence according to legal and industry best practices
  • Fulltime
Read More
Arrow Right

Senior Digital Forensics Incident Response Analyst

The Senior Information Security Incident Response Analyst leads complex incident...
Location
Location
South Africa , Johannesburg
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree or equivalent in Information Technology, Computer Science, Cybersecurity, or a related discipline (preferred)
  • Relevant GIAC or equivalent certifications such as: GSEC – Security Essentials GCIA – Certified Intrusion Analyst GCIH – Certified Incident Handler
  • Significant hands‑on experience in digital forensics and incident response across host, disk, memory, network, cloud, and mobile environments
  • Advanced experience using SIEM, EDR, IDS/IPS, packet analysis utilities, and forensic toolsets in active investigations
  • Advanced ability to analyze network traffic using tools such as Wireshark or tcpdump to distinguish normal and malicious behavior
  • Experience working in cybersecurity consulting, DFIR services, or equivalent technical security roles
  • Minimum of 5 years of experience in the technology information security industry
Job Responsibility
Job Responsibility
  • Investigates security incidents for clients by performing host, disk, memory, network, cloud, and mobile forensics
  • Conducts detailed artifact analysis across Windows, Linux, and macOS systems and reconstructs event timelines using disk images, memory captures, network data, and cloud logs
  • Guides clients through containment, eradication, and recovery activities, providing clear technical recommendations and communications
  • Acts as a senior escalation point for complex incidents and supports the development and mentoring of junior analysts
  • Participates in an on‑call rotation to support urgent, time‑sensitive incident response needs
  • Completes internal and client project work such as tabletop exercises, IR readiness engagements, environment hardening reviews, and forensic assessments
  • Identifies gaps and weaknesses in client environments and provides recommendations to reduce risk and strengthen posture
  • Produces accurate, concise documentation, including investigation notes, status communications, and final reports
  • Collaborates with global DFIR and cyber defense teams and maintains awareness of current threats, tactics, and forensic methodologies
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

Senior Marketing Data Analyst

Fivetran is building data pipelines to power the modern data stack for thousands...
Location
Location
United States , Oakland
Salary
Salary:
151535.95 - 189419.94 USD / Year
fivetran.com Logo
Fivetran
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of experience analyzing data in a marketing, growth, or go-to-market context
  • Advanced proficiency in SQL and data modeling
  • fluency with large, complex, and cross-functional datasets
  • Experience with BI tools such as Looker, Tableau, or similar platforms for building dashboards and visualizations
  • Strong attention to detail and a proven track record of analytical rigor in delivering reliable insights
  • Excellent communication and storytelling skills — able to simplify complex analyses and influence marketing and business decision-makers
  • Comfortable taking ownership of ambiguous problems and developing end-to-end analytic solutions
  • Demonstrated success using analytics to drive decisions in areas like campaign performance, funnel optimization, spend efficiency, or revenue impact
  • Passion for leveraging data and analytics to shape marketing strategy and drive measurable business impact
Job Responsibility
Job Responsibility
  • Define and own Marketing metrics across funnel performance, campaign effectiveness, pipeline contribution, and ROI
  • establish benchmarks and enable monitoring through dashboards and self-serve tools
  • Analyze diverse datasets (e.g., digital campaigns, website analytics, CRM, product usage, pipeline and revenue data) to generate actionable insights and recommendations that improve efficiency and growth
  • Lead cross-functional projects with Marketing, Sales, Finance, and Product partners in areas such as: campaign attribution and performance, pipeline conversion efficiency, spend optimization, and audience segmentation
  • Analyze marketing experiments (e.g., A/B tests, channel pilots, creative variations) to measure impact, validate hypotheses, and provide clear recommendations for scaling or iterating
  • Investigate anomalies and performance shifts, conducting deep dives and creative exploration across disparate datasets to uncover root causes and opportunities
  • Own and enhance data infrastructure for Marketing Analytics — from metric definitions to data pipelines to dashboards and reporting systems
  • Shape data culture by mentoring junior analysts and establishing best practices in metric design, marketing analytics quality, and data storytelling
What we offer
What we offer
  • 100% employer-paid medical insurance
  • Generous paid time-off policy (PTO), plus paid sick time, inclusive parental leave policy, holidays, and volunteer days off
  • RSU stock grants
  • Professional development and training opportunities
  • Company virtual happy hours, free food, and fun team-building activities
  • Monthly cell phone stipend
  • Access to an innovative mental health support platform that offers personalized care and resources in areas such as: therapy, coaching, and self-guided mindfulness exercises for all covered employees and their covered dependents
  • Fulltime
Read More
Arrow Right

NIRT SOC Analyst - Junior to Mid Level

We're looking for a Security Operations Analyst to join the National Incident Re...
Location
Location
United States
Salary
Salary:
Not provided
mmcgrp.com Logo
MMC Group LP
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field (preferred), or equivalent hands-on experience (0-2 years post-degree or 6-8 years total without degree)
  • Must be a U.S. Citizen able to obtain and maintain a Public Trust or higher-level security clearance
  • Familiarity with TCP/IP, network packet analysis, and common network protocols
  • Understanding of core IT infrastructure concepts: firewalls, IDS/IPS, endpoint protection, operating systems, databases, and encryption technologies
  • Proficiency with SIEM tools and log aggregation systems for real-time event monitoring
  • Analytical ability to identify anomalies across large, diverse datasets
  • Knowledge of contemporary cyber threats, attacker methodologies, and digital forensics fundamentals
  • Strong written and verbal communication for documenting findings and collaborating with technical peers
  • Ability to work independently while maintaining situational awareness within a team setting
  • Curiosity and drive to continually research and adapt to evolving security challenges
Job Responsibility
Job Responsibility
  • Monitor and analyze system logs, network data, and alerts to detect potential security incidents
  • Perform event triage and escalation, ensuring prompt attention to high-risk or anomalous activity
  • Investigate suspicious behaviors using multiple monitoring platforms and data sources
  • Assess data sets, structured and unstructured, to detect emerging patterns, trends, or indicators of compromise
  • Utilize SIEM and analytics tools to correlate data from various systems and enhance situational awareness
  • Provide timely and detailed documentation of incidents, observations, and resolutions
  • Participate in root-cause analysis to improve defenses and reduce recurring threats
  • Collaborate with internal response teams to coordinate containment and remediation actions
  • Research current security trends, attacker tactics, and emerging threat vectors to stay ahead of the evolving landscape
  • Respond to diverse threat types, including malware infections, phishing attempts, insider risk, denial-of-service attacks, and data exfiltration efforts
What we offer
What we offer
  • Medical, dental, and vision coverage
  • Life and disability insurance
  • Additional voluntary benefits
Read More
Arrow Right