About Charles River Associates
CRA is a leading global consulting firm that provides independent economic and
financial analysis behind litigation matters, guides businesses through critical
strategy and operational issues to become more profitable, and advises
governments on the economic impact of policies and regulations. Our two main
services – economic and management consulting – are delivered by practice groups
that focus on specific areas of expertise or industries. Click here to learn how
CRA can help you launch [http://www.crai.com/careers/launch] your career.
Position Overview
CRA’s Forensic Services
[https://www.crai.com/forensic-services-practice/] practice supports companies’
commitment to integrity by assisting them and their counsel in independently
responding to allegations of fraud, waste, abuse, misconduct, and
non-compliance. We are noted for deploying cross-trained teams of forensic
professionals to assist our clients in gaining deeper insights and greater value
more quickly. We provide accounting and forensic services as well as cybercrime
investigation services.
We are looking for curious, analytical, highly motivated candidates with 3-5
years of experience who have majored in Computer Science, Digital Forensics,
Information Security, and/or Information Systems. We value knowledge of
cybersecurity concepts, research experience, quantitative ability, exceptional
written and oral communication skills, and a high level of initiative. We expect
Consulting Associates to use data to solve client problems, work collaboratively
with a team, effectively manage their time, prioritize tasks, and take pride and
ownership in their work.
The opportunities to contribute to the Forensics team in this role may include
(but are not limited to):
- Executing security and privacy investigations for CRA clients, in preparation
of, and in response to, data security matters, which may include ongoing
breach detection, threat analysis, incident response and malware analysis;
- Providing expert digital forensic support for counsel and clients in support
of data security incidents, such as data breaches or fraud;
- Assisting in the drafting of forensic reports, affidavits and testifying as
an expert in the field of digital forensics and incident response;
- Engaging in problem-solving and forensic analysis of digital information
using standard evidence handling techniques and computer forensics tools;
- Present tactical and strategic intelligence about threat groups, the
methodologies they use and the motivations behind their activity;
- Create custom analytic products based on conclusions and judgments derived
from open and closed Intelligence sources and independent research;
- Provide timely support for clients’ incident response, hunting, threat
intelligence teams by collecting relevant intelligence and/or performing
unique research and providing analysis;
- Perform technical analysis on malicious or suspicious artifacts (malicious
executables and documents, packet captures, etc.);
- Identify, research, and organize information to assess the appropriateness
and sufficiency of available data to facilitate effective data access and
analysis;
- Developing familiarity with data that serves as input to this analysis,
including threat intelligence, logging data, as well as contextual clues;
- Recognizing relationships among multiple sources and types of information to
facilitate effective data analysis;
- Programming, model building, and database administration (Python, T-SQL, VBA,
Excel, C#, among others);
- Ensuring reliability of analysis and risk management through implementing
quality control measures and documentation;
- Forensically acquire data and images from identified hosts, and then locate
evidence of compromise determine its impact from disk, file, memory, and log
analysis;
- Identify artifact and evidence locations to answer critical questions,
including execution, file access, data theft, anti-forensics, and detailed
system usage by an adversary;
- Detect and hunt unknown live, dormant, and custom malware across multiple
hosts in an enterprise environment;
- Create Indicators of Compromise (IOCs) from analysis to strengthen incident
response and threat intelligence efforts;
- Track adversary activity second-by-second on a host via in-depth timeline
analysis;
- Understand the evidence needed to determine the type of malware used in an
attack, including rootkits, backdoors, and Trojan horses, choosing
appropriate defenses and response tactics for each;
- Identify lateral movement and pivots within client enterprises, showing how
an adversary transitions from system to system without detection;
- Use physical memory analysis tools to determine an adversary's activities on
a host and other hosts the adversary used as pivot points across the network;
- Examine traffic using common network protocols to identify patterns of
activity or specific actions that warrant further investigation;
- Identify and track malware beaconing outbound to its command and control (C2)
channel via memory forensics, registry analysis, and network connections;
- Providing technical assessment/audit and guidance to clients on the adequacy
of cyber security controls in accordance with cybersecurity frameworks that
are included in one or more of the following - NIST CSF 2.0, HIPAA, ISO 27001
and 27002, SOC2, NERC-CIP;
- Participating in practice-building activities including recruiting and
training;
Desired Qualifications
- 3-5 years of experience in cyber intrusion investigation or incident response
analysis
- Strong understanding of computer operating systems, software and hardware
- Ability to conduct detailed forensic investigations and analysis of
computers, networks, mobile devices and removable media
- Experience with conducting digital forensic analysis using commercial and
open source forensic tools. Including file system forensics, memory analysis
and network analysis
- Experience with conducting static/dynamic malware analysis in a lab
environment and threat hunting in a live environment
- Experience in collegiate computer security competitions
- Strong understanding of proper evidence handling procedures and chain of
custody
- Experience with drafting technical and investigative reports and
communicating technical findings
- Experience with utilizing automation tools and scripts to expedite analysis
- Understanding incident handling procedures: preparation, identification,
containment, eradication, and recovery-to protect enterprise environments
- Understanding of common attack techniques used by an adversary on a victim
network and leveraging those techniques to stop further adversary activity
- Experience with vulnerability management, penetration testing, scripting,
programming, reverse engineering and similar job experience
- Exposure to a variety of malware families used by Espionage or Criminal
campaigns, such as PlugX, Poison Ivy, etc.
- Proficiency with Threat Intelligence Platforms and analyst software tools
e.g. MISP, Maltego, etc.
- Digital forensics/incident response training and certifications, including
SANS GIAC (GCFA, GCFE, GNFA, GIME), IACIS (CFCE or CIFR), Magnet MCFE, X-ways
X-Pert or similar
To Apply
To be considered for a position in Canada, we require the following:
- Resume – please include current address, personal email and telephone number;
If you are interested in applying for one of our international locations, please
visit our Careers site [https://www.crai.com/cra-careers/] to view and apply for
available jobs.
Career Growth and Benefits
- CRA’s robust skills development programs
[https://www.crai.com/cra-careers/talent-development/], including a
commitment to offering 100 hours of training annually through formal and
informal programs, encourage you to thrive as an individual and team member.
Beginning with research and analysis skill building, training continues with
technical training, presentation skills, internal seminars, and career
mentoring and performance coaching from an assigned senior colleague.
Additional leadership and collaboration opportunities exist through internal
firm development activities.
- We offer a comprehensive total rewards program including a superior benefits
package, wellness programming [https://www.crai.com/benefits/] to support
physical, mental, emotional and financial well-being, and in-house
immigration support
[https://www.crai.com/cra-careers/immigration-global-mobility/] for foreign
nationals and international business travelers.
Work Location Flexibility
CRA creates a work environment that enables our colleagues to benefit from being
together in the office to best deliver on our promise of career growth,
mentorship and inclusivity. At the same time, we recognize that individuals
realize a range of benefits when working from home periodically. We currently
expect that individuals spend at least 3 to 4 days a week working in the office
(which may include traveling to another CRA office or to client meetings), with
specific days determined in coordination with your practice or team.
Our Commitment to Equal Employment Opportunity
Charles River Associates is an equal opportunity employer (EOE). All qualified
applicants will receive consideration for employment without regard to race,
color, religion, sex, national origin, age, disability, status as a protected
veteran, or any other protected characteristic under applicable law.