About Charles River Associates CRA is a leading global consulting firm that provides independent economic and financial analysis behind litigation matters, guides businesses through critical strategy and operational issues to become more profitable, and advises governments on the economic impact of policies and regulations.
Our two main services – economic and management consulting – are delivered by practice groups that focus on specific areas of expertise or industries.
Job Overview CRA's Forensic Services practice supports companies' commitment to integrity by assisting them and their counsel in independently responding to allegations of fraud, waste, abuse, misconduct, and non-compliance.
We provide accounting and forensic services as well as cybercrime investigation services.
We are looking for curious, analytical, highly motivated candidates with 3-5 years of experience who have majored in Computer Science, Digital Forensics, Information Security, and/or Information Systems.
We value knowledge of cybersecurity concepts, research experience, quantitative ability, exceptional written and oral communication skills, and a high level of initiative.
We expect Consulting Associates to use data to solve client problems, work collaboratively with a team, effectively manage their time, prioritize tasks, and take pride and ownership in their work.
The opportunities to contribute to the Forensics team in this role may include (but are not limited to):
Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, including ongoing breach detection, threat analysis, incident response, and malware analysis;Providing expert digital forensic support for counsel and clients in support of data security incidents, such as data breaches or fraud;Assisting in the drafting of forensic reports, affidavits, and testifying as an expert in the field of digital forensics and incident response;Engaging in problem-solving and forensic analysis of digital information using standard evidence handling techniques and computer forensics tools;Identifying, researching, and organizing information to assess the appropriateness and sufficiency of available data to facilitate effective data access and analysis;Developing familiarity with data that serves as input to this analysis, including threat intelligence and logging data;Recognizing relationships among multiple sources and types of information to facilitate effective data analysis;Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#, among others);Ensuring reliability of analysis and risk management through implementing quality control measures and documentation;Forensically acquiring data and images from identified hosts, and then locating evidence of compromise through disk, file, memory, and log analysis;Identifying artifact and evidence locations to answer critical questions, including execution, file access, data theft, and detailed system usage by an adversary;Detecting and hunting unknown live, dormant, and custom malware across multiple hosts in an enterprise environment;Creating Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts;Tracking adversary activity second-by-second on a host via in-depth timeline analysis;Understanding the evidence needed to determine the type of malware used in an attack, including rootkits, backdoors, and Trojan horses;Identifying lateral movement and pivots within client enterprises, showing how an adversary transitions from system to system without detection;Using physical memory analysis tools to determine an adversary's activities on a host and other hosts the adversary used as pivot points across the network;Examining traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation;Identifying and tracking malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections;Providing technical assessment/audit and guidance to clients on the adequacy of cyber security controls in accordance with cybersecurity frameworks such as NIST CSF 2.0, HIPAA, ISO 27001 and 27002, SOC2, NERC-CIP;Participating in practice-building activities including recruiting and training.Qualifications Strong understanding of computer operating systems, software, and hardware;Ability to conduct detailed forensic investigations and analysis of computers, networks, mobile devices, and removable media;Experience with conducting digital forensic analysis using commercial and open-source forensic tools, including file system forensics, memory analysis, and network analysis;Experience with conducting static/dynamic malware analysis in a lab environment and threat hunting in a live environment;Experience in collegiate computer security competitions;Strong understanding of proper evidence handling procedures and chain of custody;Experience with drafting technical and investigative reports and communicating technical findings;Experience with utilizing automation tools and scripts to expedite analysis;Understanding incident handling procedures: preparation, identification, containment, eradication, and recovery;Understanding of common attack techniques used by an adversary on a victim network;Digital forensics/incident response training and certifications, including SANS GIAC (GCFA, GCFE, GNFA, GIME), IACIS (CFCE or CIFR), Magnet MCFE, X-ways X-Pert or similar.To Apply To be considered for a position in the United States, we require the following:
Resume – please include current address, personal email, and telephone number;Cover letter – please describe your interest in CRA and how this role matches your goals.If you are interested in applying for one of our international locations, please visit our Careers site to view and apply for available jobs.
Career Growth and Benefits CRA's robust skills development programs, including a commitment to offering 100 hours of training annually through formal and informal programs, encourage you to thrive as an individual and team member.We offer a comprehensive total rewards program including a superior benefits package, wellness programming, and in-house immigration support for foreign nationals and international business travelers.Work Location Flexibility CRA creates a work environment that enables our colleagues to benefit from being together in the office while recognizing that individuals also benefit from working from home periodically.
We currently ask that individuals spend 3 to 4 days a week on average working in the office, with specific days determined in coordination with your practice or team.
Our Commitment to Diversity Charles River Associates is an equal opportunity employer (EOE/AAE).
As part of our focus on equity and inclusion, we work to ensure a fair and consistent hiring process.
We celebrate diversity and we are committed to an inclusive work environment.
The District of Columbia requires CRA to include a good-faith estimate of the wage range for this role.
A good-faith estimate of the base wage range for this role is $100,000 - $140,000; actual total compensation may also include benefits and bonus.
#J-18808-Ljbffr