OneMain Financial Jobs

Job Information

Cook Inlet Region, Inc Cyber Security Analyst III (Digital Forensics) in Anchorage, Alaska

The primary duty of the Cyber Security Analyst III (Digital Forensics) is the planning and execution of digital forensic investigations, support of electronic discovery (e-discovery) activities, and assistance with incident response efforts across the organization's federal information systems at the Hanford Site. The incumbent applies forensically sound methodologies to preserve, collect, analyze, and document digital evidence from a variety of sources including endpoints, servers, network logs, mobile devices, and cloud environments. The role collaborates closely with Legal, HR, IT Operations, and GRC teams, and ensures all investigative activities maintain chain of custody integrity and comply with applicable federal regulations and organizational policy.

Major Activities (Typical Duties/Responsibilities)

  • Conduct end-to-end digital forensic investigations, including evidence identification, preservation, acquisition, analysis, and reporting in accordance with accepted forensic standards (e.g., NIST SP 800-86).
  • Perform forensic imaging and analysis of physical and virtual endpoints (Windows, Linux, macOS), storage media, and mobile devices using industry-standard tooling.
  • Support electronic discovery (e-discovery) activities, including data identification, legal hold implementation, collection, processing, and production in coordination with Legal counsel.
  • Analyze file systems, registry artifacts, browser history, email archives, log files, and other digital artifacts to reconstruct timelines and identify indicators of malicious or unauthorized activity.
  • Conduct memory forensics and volatile data analysis during active incident response to identify malware, injected code, and attacker persistence mechanisms.
  • Support network forensics activities, analyzing packet captures and network flow data to reconstruct communications and identify data exfiltration or lateral movement.
  • Maintain rigorous chain of custody documentation for all evidence, ensuring admissibility and defensibility in administrative, civil, or law enforcement proceedings.
  • Collaborate with the Security Operations team to support incident response activities, providing forensic analysis to characterize scope, root cause, and attacker activity.
  • Produce clear, thorough forensic investigation reports and executive summaries suitable for legal review, management briefings, and regulatory submissions.
  • Manage and maintain the forensic lab environment, including hardware, licensed tooling, write blockers, and evidence storage in compliance with evidence handling policies.
  • Provide mentorship and technical guidance to junior analysts on forensic methodology, tool usage, evidence handling, and documentation standards.
  • Stay current on evolving forensic techniques, anti-forensic methods, and legal and regulatory requirements affecting digital evidence handling.
  • Perform other duties as appropriate and as assigned.

Knowledge/Skills/Abilities

Demonstrated proficiency with digital forensic methodologies and standards, including NIST SP 800-86 (Guide to Integrating Forensic Techniques into Incident Response) and accepted principles of digital evidence handling.

Hands-on experience with industry-standard forensic tools, including EnCase, FTK (Forensic Toolkit), Autopsy, Magnet AXIOM, Volatility, and equivalent tooling.

Strong knowledge of Windows and Linux file systems, artifact locations, and forensic artifact analysis (registry, prefetch, LNK files, event logs, $MFT, shellbags, etc.).

Proficiency with e-discovery processes and platforms (e.g., Relativity, Nuix, or equivalent), including legal hold workflows and data processing for legal production.

Experience with memory forensics and volatile data analysis using tools such as Volatility or equivalent.

Familiarity with network forensics techniques, including packet capture analysis (Wireshark, NetworkMiner) and SIEM log correlatio .

Understanding of cloud forensics concepts and the challenges of evidence acquisition in AWS, Azure, or equivalent environments.

Knowledge of mobile device forensics principles and tooling (e.g., Cellebrite UFED, Oxygen Forensics, or equivalent).

Understanding of applicable legal and regulatory frameworks governing digital evidence handling, including Federal Rules of Civil Procedure (FRCP) e-discovery requirements and DOE federal records management obligations.

Proficiency with scripting (Python, PowerShell, or Bash) for forensic automation, artifact parsing, and timeline generation.

Good interpersonal skills: ability to work effectively and cooperatively with all levels of management and staff, affiliated-company employees as well as outside business associates; exhibits a professional manner in dealing with others.

Superior organizational, follow-up, and detail-oriented skills.

Strong ability to analyze documents and categorize appropriately.

Ability to maintain accurate records.

Work independently, as well as on a team and with minimal supervision.

Make decisions, solve problems, and exercise excellent judgment.

Work well under pressure and independently prioritize workload, while working on multiple projects.

Ability to research, organize and analyze technical information with particular attention to accuracy and detail.

Excellent written and verbal communication skills; including thorough knowledge of proper grammar, advanced vocabulary, spelling, editing and proofreading skills.

[]{style="font-family: Geor

"}

DirectEmployers