Consulting Associate/Cybersecurity & Incident Response (Forensic Services practice) jobs in United States
cer-icon
Apply on Employer Site
company-logo

Charles River Associates · 2 weeks ago

Consulting Associate/Cybersecurity & Incident Response (Forensic Services practice)

Charles River Associates (CRA) is a leading global consulting firm that provides economic and financial analysis behind litigation matters and advises businesses and governments. They are seeking a Consulting Associate in their Cybersecurity & Incident Response practice to assist clients in responding to allegations of fraud and misconduct, executing investigations, and providing expert digital forensic support.

AuctionsConsultingLegal
check
Growth Opportunities

Responsibilities

Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malware analysis
Providing expert digital forensic support for counsel and clients in support of data security incidents, such as data breaches or fraud
Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response
Engaging in problem-solving and forensic analysis of digital information using standard evidence handling techniques and computer forensics tools
Present tactical and strategic intelligence about threat groups, the methodologies they use and the motivations behind their activity
Create custom analytic products based on conclusions and judgments derived from open and closed Intelligence sources and independent research
Provide timely support for clients’ incident response, hunting, threat intelligence teams by collecting relevant intelligence and/or performing unique research and providing analysis
Perform technical analysis on malicious or suspicious artifacts (malicious executables and documents, packet captures, etc.)
Identify, research, and organize information to assess the appropriateness and sufficiency of available data to facilitate effective data access and analysis
Developing familiarity with data that serves as input to this analysis, including threat intelligence, logging data, as well as contextual clues
Recognizing relationships among multiple sources and types of information to facilitate effective data analysis
Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#, among others)
Ensuring reliability of analysis and risk management through implementing quality control measures and documentation
Forensically acquire data and images from identified hosts, and then locate evidence of compromise determine its impact from disk, file, memory, and log analysis
Identify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary
Detect and hunt unknown live, dormant, and custom malware across multiple hosts in an enterprise environment
Create Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts
Track adversary activity second-by-second on a host via in-depth timeline analysis
Understand the evidence needed to determine the type of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each
Identify lateral movement and pivots within client enterprises, showing how an adversary transitions from system to system without detection
Use physical memory analysis tools to determine an adversary's activities on a host and other hosts the adversary used as pivot points across the network
Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation
Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections
Providing technical assessment/audit and guidance to clients on the adequacy of cyber security controls in accordance with cybersecurity frameworks that are included in one or more of the following - NIST CSF 2.0, HIPAA, ISO 27001 and 27002, SOC2, NERC-CIP
Participating in practice-building activities including recruiting and training

Qualification

Cybersecurity conceptsDigital forensicsIncident responseMalware analysisProgrammingThreat intelligenceEvidence handlingTechnical writingAnalytical skillsCommunication skillsTeam collaborationTime management

Required

3-5 years of experience
Majored in Computer Science, Digital Forensics, Information Security, and/or Information Systems
Knowledge of cybersecurity concepts
Research experience
Quantitative ability
Exceptional written and oral communication skills
High level of initiative
Ability to use data to solve client problems
Ability to work collaboratively with a team
Ability to effectively manage time and prioritize tasks
Ability to take pride and ownership in work
Executing security and privacy investigations for CRA clients
Providing expert digital forensic support for counsel and clients
Assisting in the drafting of forensic reports and affidavits
Engaging in problem-solving and forensic analysis of digital information
Presenting tactical and strategic intelligence about threat groups
Creating custom analytic products based on conclusions and judgments
Providing timely support for clients' incident response and threat intelligence teams
Performing technical analysis on malicious or suspicious artifacts
Identifying, researching, and organizing information for effective data access and analysis
Developing familiarity with data that serves as input to analysis
Recognizing relationships among multiple sources and types of information
Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#)
Ensuring reliability of analysis and risk management through quality control measures
Forensically acquiring data and images from identified hosts
Identifying artifact and evidence locations to answer critical questions
Detecting and hunting unknown live, dormant, and custom malware
Creating Indicators of Compromise (IOCs) from analysis
Tracking adversary activity second-by-second on a host
Understanding the evidence needed to determine the type of malware used in an attack
Identifying lateral movement and pivots within client enterprises
Using physical memory analysis tools to determine an adversary's activities
Examining traffic using common network protocols
Identifying and tracking malware beaconing outbound to its command and control channel
Providing technical assessment/audit and guidance to clients on cyber security controls
Participating in practice-building activities including recruiting and training

Benefits

CRA’s robust skills development programs, including a commitment to offering 100 hours of training annually through formal and informal programs, encourage you to thrive as an individual and team member.
Comprehensive total rewards program including a superior benefits package, wellness programming to support physical, mental, emotional and financial well-being, and in-house immigration support for foreign nationals and international business travelers.

Company

Charles River Associates

company-logo
Charles River Associates is a consulting firm specializing in financial, litigation, regulatory, and management consulting.

Funding

Current Stage
Public Company
Total Funding
$250M
2022-08-22Post Ipo Debt· $250M
1998-04-24IPO

Leadership Team

leader-logo
Paul Maleh
President and CEO
linkedin
leader-logo
Adam Hart
Vice President
linkedin
Company data provided by crunchbase