Level 3 Digital Forensics and Incident Response Analyst

Remote Full-time
About the position

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years, our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. Job Description For this L3 DFIR opportunity, your core schedule will be Mon – Fri (9:00am – 5:30pm of your local time zone). This is a Remote US-based position. We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team. This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment, and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk (“dead box”) acquisition efforts alongside senior team members. You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it.

Responsibilities
• Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes.
• Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks.
• Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster.
• Mentor fellow SOC analysts and act as a go-to person for tough security challenges.
• Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving.
• Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats.
• Perform network, disk, system files and memory forensic analysis.
• Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure.
• Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences.
• Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks.
• Define and assist in creation of operational and executive reports
• Constantly stay connected with teammates and partners to share insights and improve how we respond to threats.

Requirements
• 7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics.
• Extensive experience in Incident Response, Incident Handling and Security Operations.
• Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures.
• Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
• Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmerman's tools.
• Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
• Practical knowledge of MITRE ATT&CK and threat actor TTPs.
• Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek.
• Familiarity with common scripting languages (Python, PowerShell, Bash) for automating investigations and tool integration.
• Strong written and verbal communication skills, especially in producing high-quality reports and briefings.

Nice-to-haves
• Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform.
• Reverse engineering skills or familiarity with dynamic/static malware analysis techniques.
• Development or tuning of detection rules (e.g., Sigma, Snort, Suricata, YARA).
• Experience working in large enterprise or multi-tenant environments.
• Cybersecurity certifications such as: GCFA, GCIH, GNFA, GREM, GCIA, CISSP, OSCP, or similar.
• Working knowledge of security frameworks and compliance standards such as NIST 800-61, MITRE D3FEND, ISO 27001, HIPAA, PCI-DSS.

Apply tot his job

Apply To this Job
Apply Now

Similar Opportunities

Experienced Registered Behavior Technician for In-Home ABA Therapy - Atlanta, GA

Remote Full-time

Immediate Hiring: Experienced Registered Behavioral Technician (RBT) for Clinic-Based ABA Therapy Services

Remote Full-time

Experienced Registered Behavioral Technician (RBT) - ABA Therapy for Children with Autism Spectrum Disorder

Remote Full-time

Experienced Registered Nurse - Telehealth: Providing Remote Care Coordination and Patient Support

Remote Full-time

Experienced Substitute Teacher for Riverside County Schools - Join Scoot Education's Innovative Team

Remote Full-time

Experienced Substitute Teacher for San Bernardino County - Flexible Schedules & Competitive Pay

Remote Full-time

Experienced School Year Instructional Coach for High-Dosage Tutoring Programs in Edgewater Park, NJ

Remote Full-time

Experienced School Year Tutor for K-8 Students in Math and Literacy - Mickleton, NJ

Remote Full-time

Experienced Secondary Social Studies Teacher for Kansas - Flexible Hybrid Remote Arrangement

Remote Full-time

USPS Office Helper

Remote Full-time

Experienced Remote Customer Service Professional - Full-Time Remote Chat Support Agent Opportunity with blithequark, Earning $25-$35/hr

Remote Full-time

Mortgage Loan Officer - Entry Level (SAFE Passed Required)

Remote Full-time

Experienced Customer Service Representative – Remote Travel Industry Opportunity with arenaflex, Offering Competitive Hourly Rate and Flexible Scheduling

Remote Full-time

**Experienced Data Entry Clerk Wanted - Work From Home Opportunity with arenaflex**

Remote Full-time

HR Service Center Benefits Advisor

Remote Full-time

DESIGNER, INSTRUCTIONAL

Remote Full-time

**Experienced Administrative Data Entry Specialist – Remote Opportunity at blithequark**

Remote Full-time

Senior Cyber Defense Forensic Analyst - Mid-Atlantic region (Remote - EST)

Remote Full-time

Scheduling Lead, Medical Group - Remote - Immediate Opening - Competitive Salary - HarmonyCares

Remote Full-time

Test Publishing Administrator

Remote Full-time
← Back to Home