Level 3 Digital Forensics and Incident Response Analyst

AllstateMcCullom Lake, IL
11dRemote

About The Position

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years, our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. Job Description For this L3 DFIR opportunity, your core schedule will be Mon – Fri (9:00am – 5:30pm of your local time zone). This is a Remote US-based position. We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team. This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment, and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk (“dead box”) acquisition efforts alongside senior team members. You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it.

Requirements

  • 7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics.
  • Extensive experience in Incident Response, Incident Handling and Security Operations.
  • Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures.
  • Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
  • Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmerman's tools.
  • Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
  • Practical knowledge of MITRE ATT&CK and threat actor TTPs.
  • Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek.
  • Familiarity with common scripting languages (Python, PowerShell, Bash) for automating investigations and tool integration.
  • Strong written and verbal communication skills, especially in producing high-quality reports and briefings.

Nice To Haves

  • Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform.
  • Reverse engineering skills or familiarity with dynamic/static malware analysis techniques.
  • Development or tuning of detection rules (e.g., Sigma, Snort, Suricata, YARA).
  • Experience working in large enterprise or multi-tenant environments.
  • Cybersecurity certifications such as: GCFA, GCIH, GNFA, GREM, GCIA, CISSP, OSCP, or similar.
  • Working knowledge of security frameworks and compliance standards such as NIST 800-61, MITRE D3FEND, ISO 27001, HIPAA, PCI-DSS.

Responsibilities

  • Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes.
  • Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks.
  • Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster.
  • Mentor fellow SOC analysts and act as a go-to person for tough security challenges.
  • Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving.
  • Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats.
  • Perform network, disk, system files and memory forensic analysis.
  • Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure.
  • Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences.
  • Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks.
  • Define and assist in creation of operational and executive reports
  • Constantly stay connected with teammates and partners to share insights and improve how we respond to threats.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service