Back to Jobs

Level 3 Digital Forensics and Incident Response Analyst US - Remote

Remote, USA Full-time Posted 2025-11-24
At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years, our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. Job Description • *For this L3 DFIR opportunity, your core schedule will be Mon – Fri (9:00am – 5:30pm of your local time zone). This is a Remote US-based position.** We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team. This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment, and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk (“dead box”) acquisition efforts alongside senior team members. You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it. Key Responsibilities • Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes. • Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks. • Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster. • Mentor fellow SOC analysts and act as a go-to person for tough security challenges. • Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving. • Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats. • Perform network, disk, system files and memory forensic analysis. • Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure. • Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences. • Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks. • Define and assist in creation of operational and executive reports • Constantly stay connected with teammates and partners to share insights and improve how we respond to threats. Required Qualifications • 7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics. • Extensive experience in Incident Response, Incident Handling and Security Operations. • Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures. • Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint). • Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmermans tools. • Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis. • Practical knowledge of MITRE ATT&CK and threat actor TTPs. • Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek. • Familiarity with common scripting languages (Python, PowerShell, Bash) for automating investigations and tool integration. • Strong written and verbal communication skills, especially in producing high-quality reports and briefings. Preferred Qualifications • Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform. • Reverse engineering skills or familiarity with dynamic/static malware analysis techniques. • Development or tuning of detection rules (e.g., Sigma, Snort, Suricata, YARA). • Experience working in large enterprise or multi-tenant environments. • Cybersecurity certifications such as: GCFA, GCIH, GNFA, GREM, GCIA, CISSP, OSCP, or similar. • Working knowledge of security frameworks and compliance standards such as NIST 800-61, MITRE D3FEND, ISO 27001, HIPAA, PCI-DSS. #LI-JJ1 Skills Cybersecurity, Digital Forensics, Endpoint Detection and Response (EDR), Incident Response, Log Analysis, Scripting, Security Information and Event Management (SIEM), Security Monitoring, Security Operations, Technical Reporting Compensation Compensation offered for this role is 120,000.00 - 193,725.00 annually and is based on Apply tot his job Apply To this Job

Similar Jobs

Director, Product Analysis (Vendor Manager)

Remote, USA Full-time

Remote Teachers of Record (7-12 Social Studies)

Remote, USA Full-time

Manager, Content Operations

Remote, USA Full-time

Tele-Med Remote Monitor Sitter

Remote, USA Full-time

Law Office Manager

Remote, USA Full-time

Office Manager, YSM Development and Alumni Affairs

Remote, USA Full-time

Office Manager-Police Department

Remote, USA Full-time

Channel Management - Senior Manager

Remote, USA Full-time

Account Manager-Retail SMB Business Sales

Remote, USA Full-time

Verizon Customer Service Representative

Remote, USA Full-time

Remote Work From Home Data Entry Clerk / Typing (remote) – Hiring Now

Remote, USA Full-time

Application Development – Software Engineer - UI, Intern

Remote, USA Full-time

Sales Development Representative - B2B SaaS

Remote, USA Full-time

Cybersecurity Solution Architect

Remote, USA Full-time

Part-Time Night Shift Customer Support Representative – Remote – No Experience Needed

Remote, USA Full-time

Technical Operations Analyst, Night Shift - Work From Home

Remote, USA Full-time

**Database Customer Engineer – Cloud Data Solutions Expert at blithequark**

Remote, USA Full-time

**Experienced Online Data Entry Specialist – Remote Database Management and Data Integrity**

Remote, USA Full-time

Xero Bookkeeper needed for online education business

Remote, USA Full-time

Experienced Data Entry Specialist for Logistics and Courier Services – Entry Level Opportunity with Comprehensive Training and Career Growth

Remote, USA Full-time