Senior Associate, Information Security - Forensics
Listed on 2025-12-27
-
IT/Tech
Cybersecurity, Information Security
Company Description
Publicis Re:
Sources is the backbone of Publicis Groupe, the world’s most valuable agency group. It is the only full‑service, end‑to‑end shared service organization in the industry, enabling Groupe agencies to innovate and transform for their clients. Formed in 1998 as a small team, it has grown to 6,200+ employees globally and provides technology solutions and business services including finance, accounting, legal, benefits, procurement, tax, real estate, treasury and risk management.
The Senior Associate, Information Security - Forensics is part of a global team and is responsible for incident response of cyber security incidents that are associated with our businesses, clients, and vendors. The role requires strong technical skills to ensure incident containment, remediation, and closure, and involves working closely with legal, data privacy, business, and client teams while interacting with senior executives, including C‑level staff.
Salary Range: $100‑125K/yr.
- Incident Commander to lead investigation and response of cyber security incidents.
- Analyze compromised or potentially compromised systems using forensic tools.
- Coordinate evidence/data gathering and document security incident reports.
- Manage, review, and present written and oral reports succinctly for management distribution.
- Maintain current knowledge of tools and best practices in advanced persistent threats and incident response.
- Perform complex forensic investigations into system breaches, data leaks, and system weaknesses.
- Provide technical expertise on security incident monitoring, triage, response, threat & vulnerability management, and security analysis.
- Provide strategic direction on Incident Management activities, including automation with AI tools.
- Experience with EDR tools (Crowd Strike, Sentinel One) and malware analysis.
- Proficiency with forensic tools such as FTK, EnCase, Autopsy for file system, process, application, and memory analysis across Windows, Mac, and Linux.
- 4+ years in an analytical role (forensics analyst, threat analyst, SOC analyst, security engineer or consultant).
- Experience with cloud environments (Azure, AWS, GCP) and log analysis (Guard Duty, Defender, Cloud Trail).
- Familiarity with MITRE ATT&CK or related frameworks.
- Experience developing and managing incident response programs focused on efficiency through AI.
- Strong communication skills and confidence leading Incident Response calls with stakeholders.
- Proficient in social engineering, phishing, and related fraud schemes.
- General knowledge of network and web application security issues.
- Experience with scripting languages (Python, Bash, Power Shell) in incident handling.
All information will be kept confidential according to EEO guidelines.
This job description does not state or imply that these are the only duties. Employees may be required to perform other job‑related duties as directed.
All duties and responsibilities are essential job functions and may be modified to accommodate individuals with disabilities.
This document does not create an employment contract, but it includes at‑will employment information.
Seniority Level- Not Applicable
- Full‑time
- Finance and Sales
- Advertising Services
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).