×
Register Here to Apply for Jobs or Post Jobs. X

Consulting Associate​/Cybersecurity & Incident Response; Forensic Services practice

Job in Toronto, Ontario, C6A, Canada
Listing for: Charles River Associates
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Consulting Associate/Cybersecurity & Incident Response (Forensic Services practice)   About Charles River Associates
CRA is a leading global consulting firm that provides independent economic and financial analysis behind litigation matters, guides businesses through critical strategy and operational issues to become more profitable, and advises governments on the economic impact of policies and regulations. Our two main services – economic and management consulting – are delivered by practice groups that focus on specific areas of expertise or industries.  

to learn how CRA can help you launch your career.

Position Overview
CRA’s Forensic Services practice supports companies’ commitment to integrity by assisting them and their counsel in independently responding to allegations of fraud, waste, abuse, misconduct, and non-compliance. We are noted for deploying cross-trained teams of forensic professionals to assist our clients in gaining deeper insights and greater value more quickly. We provide accounting and forensic services as well as cybercrime investigation services.
We are looking for curious, analytical, highly motivated candidates with 3-5 years of experience who have majored in Computer Science, Digital Forensics, Information Security, and/or Information Systems. We value knowledge of cybersecurity concepts, research experience, quantitative ability, exceptional written and oral communication skills, and a high level of initiative. We expect Consulting Associates to use data to solve client problems, work collaboratively with a team, effectively manage their time, prioritize tasks, and take pride and ownership in their work.
The opportunities to contribute to the Forensics team in this role may include (but are not limited to):
Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malware analysis;
Providing expert digital forensic support for counsel and clients in support of data security incidents, such as data breaches or fraud;
Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response;
Engaging in problem-solving and forensic analysis of digital information using standard evidence handling techniques and computer forensics tools;
Present tactical and strategic intelligence about threat groups, the methodologies they use and the motivations behind their activity;
Create custom analytic products based on conclusions and judgments derived from open and closed Intelligence sources and independent research;
Provide timely support for clients’ incident response, hunting, threat intelligence teams by collecting relevant intelligence and/or performing unique research and providing analysis;
Perform technical analysis on malicious or suspicious artifacts (malicious executables and documents, packet captures, etc.);
Identify, research, and organize information to assess the appropriateness and sufficiency of available data to facilitate effective data access and analysis;
Developing familiarity with data that serves as input to this analysis, including threat intelligence, logging data, as well as contextual clues;
Recognizing relationships among multiple sources and types of information to facilitate effective data analysis;
Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#, among others);
Ensuring reliability of analysis and risk management through implementing quality control measures and documentation;
Forensically acquire data and images from identified hosts, and then locate evidence of compromise determine its impact from disk, file, memory, and log analysis;
Identify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary;
Detect and hunt unknown live, dormant, and custom malware across multiple hosts in an enterprise environment;
Create Indicators of Compromise (IOCs) from analysis to strengthen incident response and…
Position Requirements
10+ Years work experience
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary