Search jobs > Boston, MA > Incident response

Associate/Cybersecurity & Incident Response (Forensic Services practice)

Charles River Associates
Boston, MA
Full-time

About Charles River Associates

CRA is a leading global consulting firm that provides independent economic and financial analysis behind litigation matters, guides businesses through critical strategy and operational issues to become more profitable, and advises governments on the economic impact of policies and regulations.

Our two main services economic and management consulting are delivered by practice groups that focus on specific areas of expertise or industries.

Click here to learn how CRA can help you your career.

CRA’s practice supports companies’ commitment to integrity by assisting them and their counsel in independently responding to allegations of fraud, waste, abuse, misconduct, and non-compliance.

We are noted for deploying cross-trained teams of forensic professionals to assist our clients in gaining deeper insights and greater value more quickly.

We provide accounting and forensic services as well as cybercrime investigation services.

Position Overview

We are looking for curious, analytical, highly motivated candidates with 2-4 years of experience who have majored in Computer Science, Digital Forensics, Information Security, and / or Information Systems.

We value knowledge of cybersecurity concepts, research experience, quantitative ability, exceptional written and oral communication skills, and a high level of initiative.

We expect Associates to use data to solve client problems, work collaboratively with a team, effectively manage their time, prioritize tasks, and take pride and ownership in their work.

The opportunities to contribute to the Forensics team in this role may include (but are not limited to) :

  • Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malware analysis;
  • Providing expert digital forensic support for counsel and clients in support of data security incidents, such as data breaches or fraud;
  • Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response;
  • Engaging in problem-solving and forensic analysis of digital information using standard evidence handling techniques and computer forensics tools;
  • Identify, research, and organize information to assess the appropriateness and sufficiency of available data to facilitate effective data access and analysis;
  • Developing familiarity with data that serves as input to this analysis, including threat intelligence, logging data, as well as contextual clues;
  • Recognizing relationships among multiple sources and types of information to facilitate effective data analysis;
  • Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#, among others);
  • Ensuring reliability of analysis and risk management through implementing quality control measures and documentation;
  • Forensically acquire data and images from identified hosts, and then locate evidence of compromise determine its impact from disk, file, memory, and log analysis;
  • Identify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary;
  • Detect and hunt unknown live, dormant, and custom malware across multiple hosts in an enterprise environment;
  • Create Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts;
  • Track adversary activity second-by-second on a host via in-depth timeline analysis;
  • Understand the evidence needed to determine the type of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each;
  • Identify lateral movement and pivots within client enterprises, showing how an adversary transitions from system to system without detection;
  • Use physical memory analysis tools to determine an adversary's activities on a host and other hosts the adversary used as pivot points across the network;
  • Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation;
  • Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections;
  • Providing technical assessment / audit and guidance to clients on the adequacy of cyber security controls in accordance with cybersecurity frameworks that are included in one or more of the following - NIST CSF 2.
  • 0, HIPAA, ISO 27001 and 27002, SOC2, NERC-CIP;
  • Participating in practice-building activities including recruiting and training;

Desired Qualifications

  • Strong understanding of computer operating systems, software and hardware
  • Ability to conduct detailed forensic investigations and analysis of computers, networks, mobile devices and removable media
  • Experience with conducting digital forensic analysis using commercial and open source forensic tools. Including file system forensics, memory analysis and network analysis
  • Experience with conducting static / dynamic malware analysis in a lab environment and threat hunting in a live environment
  • Experience in collegiate computer security competitions
  • Strong understanding of proper evidence handling procedures and chain of custody
  • Experience with drafting technical and investigative reports and communicating technical findings
  • Experience with utilizing automation tools and scripts to expedite analysis
  • Understanding incident handling procedures : preparation, identification, containment, eradication, and recovery-to protect enterprise environments
  • Understanding of common attack techniques used by an adversary on a victim network and leveraging those techniques to stop further adversary activity
  • Digital forensics / incident response training and certifications, including SANS GIAC (GCFA, GCFE, GNFA, GIME), IACIS (CFCE or CIFR), Magnet MCFE, X-ways X-Pert or similar
  • 30+ days ago
Related jobs
Charles River Associates
Boston, Massachusetts

Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response;. We provide accounting and forensic services as well as cybercrime investigation services. Executing security and privacy investigations for CRA clients, in ...

Cybereason
Boston, Massachusetts
Remote

We are seeking a highly skilled and motivated Digital Forensics and Incident Response (DFIR) Specialist to join our cybersecurity team. The ideal candidate will be responsible for investigating and responding to cybersecurity incidents, conducting digital forensic investigations, and implementing st...

Charles River Associates
Boston, Massachusetts

We provide accounting and forensic services as well as cybercrime investigation services. Leading security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malw...

Charles River Associates
Boston, Massachusetts

We provide accounting and forensic services as well as cybercrime investigation services. Leading security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malw...

Charles River Associates
Boston, Massachusetts

Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response;. We provide accounting and forensic services as well as cybercrime investigation services. Executing security and privacy investigations for CRA clients, in ...

Charles River Associates
Boston, Massachusetts

We provide accounting and forensic services as well as cybercrime investigation services. Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and ma...

Promoted
Abacus Technology Corporation
Hanscom Air Force Base, Massachusetts

Abacus Technology is seeking a Systems Engineer to provide technical support for the Technical Advisory and Assistance Services (TAAS) program at Hanscom AFB. Perform work that applies a broad theoretical and practical knowledge of system engineering to the acquisition process. Conduct reviews on pr...

Promoted
MITRE
Bedford, Massachusetts

The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. Our AI-enhanced Discovery and Decisions department has a need for an Artificial Intelligence and Decision Engineer with a passion f...

Promoted
KBR
Lincoln, Massachusetts

Join our small but dynamic and impactful team of talented and forward leaning analysts in supporting cybersecurity operations to meet US Air Force requirements here at Hanscom AFB, MA. You will be part of a team of analysts supporting Air Force programs in acquisition and sustainment to assess and i...

Promoted
Amentum
Boston, Massachusetts

Bachelor’s Degree OR at least eight years direct relevant intelligence analyst experience e. Eight years analytical experience at the tactical/operational level within DoD OR equivalent Government agencies and requires former MOS 350F, 18F, 35D, 34A, 35F, 35F, 35D, 34A OR equivalent specialty codes ...