
Senior Forensics Analyst at Arctic Wolf. Location Information: Remote - Japan. . At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We’re proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN’s Products of the Year award in the inaugural Security Operations Platform category. Join a company that’s not only leading, but also shaping, the future of security operations. . Our mission is simple: End Cyber Risk. We’re looking for a Senior . Incident Response. Forensics Analyst to be part of making that happen. . About the Role: . The Senior Incident Response Forensic Analyst is a highly technical member of Digital Forensics and Incident Response (“DFIR”) team. The Senior Forensic Analyst is responsible for conducting forensic investigations of traditional network intrusions in Active Directory environments along with Business Email Compromises (“BEC”). The Senior Analyst assists with technical initiatives that further the business while taking opportunities to mentor junior analysts.. Responsibilities: . Technical Competencies. Conduct forensic investigations for organizations that have suffered an attack from targeted threats, such as Advanced Persistent Threats, Organized Crime, and politically motivated groups, or from commodity threats such as ransomware groups.. Perform host forensic analysis on Windows, Linux, and Mac OS based systems.. Perform network analysis using a variety of tools and log sources to include firewall logs, NetFlow, and logs generated from a variety of network intrusions detection/prevention tools.. Assist with/conduct the forensic acquisition and analysis from Azure, Amazon Web Services (“AWS”), and Google Cloud Platform (“GCP”) environments.. Leverage applicable tooling to contain and eradicate a threat actor’s presence from a client’s network when responding to live intrusion events.. Understand the capabilities of malicious binaries and scripts through basic static and dynamic analysis efforts.. Make tactical recommendations for compromised client organizations.. Communication and Client Management. Communicate both executive and detailed level findings in verbal and written form; Present technical findings in a manner that assists external legal counsel in understanding potential regulatory implications.. Communicate all items relevant to the forensic investigation, in a manner that deescalates situations and presents a coherent strategy moving forward.. Scope new cases and lead update calls when needed.. Leadership and Initiatives. Stays current with developments within the DFIR field; Integrates new developments into current processes and procedures where necessary. Partner with internal teams to publish blogs regarding threat actor tactics, techniques, and procedures (“TTP), vulnerabilities,. Mentor junior analysts on technical and soft skills. General. Participate in weekday escalation and weekend/holiday on call schedules.. Conduct audits and peer review of incident reports. . Fosters information sharing and collaboration.. Required Skills and Experience: . Three or more years professional experience with digital forensics and . incident response. or other similar cybersecurity roles. Ability to respond to inquiries and work beyond normal business hours, as needed. Advanced knowledge of host-based forensic, network analysis, and data breach response. Advanced knowledge of current attack vectors and trends in cybersecurity. Ability to identify indicators of compromise (“IOC”) from newly released exploits that have little to no community documentation. Experience with IR and forensic tools, such as Magnet Axiom, Encase, FTK, X-Ways, SIFT, and other open-source forensic tools. Experience with commercial Endpoint Detection and Response (“EDR”), network monitoring, and Security Information and Event Management (“. SIEM. ”) tools. Analysis of disparate forensic artifacts. Ability to draw sound conclusions despite gaps or ambiguity with evidence. Written and verbal communication. Team mentorship and knowledge sharing. Preferred Skills and Experience: . Bachelor’s Degree in Information Security, Digital Forensics, Computer Science, or other related field. Certifications: GCFA, GCFE, ACE, EnCE, or similar training and certification. Prior consulting experience. Prior experience presenting at industry conferences and events. Prior experience developing scripts and tools to analyze data. Prior experience with malware analysis and reverse engineering. About Arctic Wolf:. At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work – USA (2021-2024), Great Place to Work – Canada (2021-2024), Great Place to Work – UK (2024), and Kununu Top Company – Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. . Our Values. . Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that—by protecting people’s and organizations’ sensitive data and seeking to end cyber risk— we get to work in an industry that is fundamental to the greater good. . We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity . here. . . We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. . All wolves receive compelling compensation and benefits packages, including: . Equity for all employees . Flexible time off and paid volunteer days . Training and career development programs . Comprehensive private benefits plan including medical, mental health, dental, disability, life and AD&D, and value-added services . Robust Employee Assistance Program (EAP) with mental health services . Fertility support and paid parental leave . . Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing . [email protected]. .. . Security Requirements:. Conducts duties and responsibilities in accordance with AWN’s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies).. Background checks are required for this position.. This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations (“EAR”). Please note that, if applicable, an offer for employment will be conditioned on authorization to receive software or technology controlled under these U.S. export control laws and regulations. . .