×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Level 3 Digital Forensics and Incident Response Analyst

Remote / Online - Candidates ideally in
Indiana Borough, Indiana County, Pennsylvania, 15705, USA
Listing for: Allstate Insurance Company
Remote/Work from Home position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 120000 - 193725 USD Yearly USD 120000.00 193725.00 YEAR
Job Description & How to Apply Below

Overview

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years, our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.

Job Description

For this L3 DFIR opportunity, your core schedule will be Mon – Fri (9:00am – 5:30pm of your local time zone). This is a Remote US-based position. We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team.

This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment, and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk ("dead box") acquisition efforts alongside senior team members.

You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it.

Key Responsibilities
  • Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes.
  • Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks.
  • Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster.
  • Mentor fellow SOC analysts and act as a go-to person for tough security challenges.
  • Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving.
  • Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats.
  • Perform network, disk, system files and memory forensic analysis.
  • Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure.
  • Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences.
  • Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks.
  • Define and assist in creation of operational and executive reports
  • Constantly stay connected with teammates and partners to share insights and improve how we respond to threats.
Required Qualifications
  • 7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics.
  • Extensive experience in Incident Response, Incident Handling and Security Operations.
  • Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures.
  • Proficiency with EDR/XDR platforms (e.g., Crowd Strike, Sentinel One, Microsoft Defender for Endpoint).
  • Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmerman s tools.
  • Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
  • Practical knowledge of MITRE ATT&CK and threat actor TTPs.
  • Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek.
  • Familiarity with common scripting languages (Python, Power Shell, Bash) for automating investigations and tool integration.
  • Strong written and verbal communication skills, especially in producing high-quality reports and briefings.
Preferred Qualifications
  • Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform.
  • Reverse engineering skills or familiarity with…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary