Allstate

Level 3 Digital Forensics and Incident Response Analyst


PayCompetitive
LocationMyrtle Point/Oregon
Employment typeFull-Time
  • Job Description

      Req#: R17988
      Employer Industry: Cybersecurity

      Why consider this job opportunity:
      - Salary up to $193,725 annually based on experience and qualifications
      - Opportunity for career advancement and growth within the organization
      - Remote work flexibility, allowing you to work from anywhere in the U.S.
      - Collaborative and innovative work environment focused on making a meaningful impact
      - Involvement in high-impact security initiatives with a chance to shape future protection strategies

      What to Expect (Job Responsibilities):
      - Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes
      - Handle high-severity threats from start to finish, ensuring thorough analysis and escalation
      - Collaborate with engineers to improve detection rules and integrate new security tools
      - Mentor junior SOC analysts and provide guidance on challenging security issues
      - Perform forensic analysis of network, disk, system files, and memory to uncover hidden threats

      What is Required (Qualifications):
      - 7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics
      - Extensive experience in Incident Response, Incident Handling, and Security Operations
      - Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures
      - Proficiency with EDR/XDR platforms, such as CrowdStrike and Microsoft Defender for Endpoint
      - Familiarity with modern forensic tools and experience with SIEM platforms for threat detection and analysis

      How to Stand Out (Preferred Qualifications):
      - Experience in cloud-native security monitoring and incident response in environments like AWS or Azure
      - Skills in reverse engineering or familiarity with malware analysis techniques
      - Development or tuning of detection rules using frameworks like Sigma or YARA
      - Experience working in large enterprise or multi-tenant environments
      - Cybersecurity certifications such as GCFA, GCIH, or CISSP

      #Cybersecurity #DigitalForensics #IncidentResponse #RemoteWork #CareerOpportunity

      We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately.
      We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer.
  • About the company

Notice

Talentify is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status.

Talentify provides reasonable accommodations to qualified applicants with disabilities, including disabled veterans. Request assistance at accessibility@talentify.io or 407-000-0000.

Federal law requires every new hire to complete Form I-9 and present proof of identity and U.S. work eligibility.

An Automated Employment Decision Tool (AEDT) will score your job-related skills and responses. Bias-audit & data-use details: www.talentify.io/bias-audit-report. NYC applicants may request an alternative process or accommodation at aedt@talentify.io or 407-000-0000.