Forensics Analyst | AIIR – AI-driven Incident Response

2 years

0 Lacs

Posted:1 day ago| Platform: Linkedin logo

Apply

Work Mode

Remote

Job Type

Contractual

Job Description

Company Description

AiiR Response Inc. is an AI-driven platform specializing in breach response and extortion management to automate negotiations, investigations, and recovery. At the core of our operations is CEIRA, an AI-powered virtual analyst for ransom negotiations, cryptocurrency payment tracking, forensic investigations, and automated breach notifications. We empower cyber insurers, enterprises, and cybersecurity teams to reduce breach costs, respond faster, and ensure compliance through AI-enhanced threat detection and containment. Visit us at www.AiiResponse.com for more information.


Role Description

This is a contract remote role for a Forensics Analyst. The Forensics Analyst will be responsible for conducting forensic analysis and investigations, analyzing malware, and compiling evidence related to cybersecurity incidents. They will utilize AI-driven tools to streamline the forensic process and enhance threat intelligence gathering.


Qualifications

  • Forensic Analysis and Evidence skills
  • Malware Analysis and Analytical skills
  • Cybersecurity expertise
  • Strong written and verbal communication skills
  • Ability to work independently in a remote setting
  • Experience with AI-driven forensic tools is a plus
  • Bachelor’s degree in Computer Science, Information Security, or a related field
  • Relevant certifications such as CISA, GCFA, or CEH are advantageous


Responsibilities

  • Conduct digital forensic investigations across Windows, Linux, and macOS environments.
  • Use 

    Velociraptor

     alongside other forensic tools to collect, preserve, and analyze evidence.
  • Perform endpoint, memory, and disk forensics to uncover attacker actions, persistence, and lateral movement.
  • Develop Velociraptor VQL queries for targeted hunts and investigations.
  • Correlate forensic findings with SOC alerts, threat intel, and IR casework.
  • Document findings with clear timelines and technical evidence suitable for incident response and legal reporting.


Requirements

  • 2-4+ years of experience in digital forensics/incident response.
  • Hands-on experience with 

    Velociraptor

     plus at least two additional tools (Volatility, Autopsy, FTK, EnCase, etc.).
  • Strong knowledge of Windows internals, registry analysis, and common attacker TTPs.
  • Scripting ability (Python, PowerShell, Bash) to automate evidence extraction.
  • Solid understanding of chain-of-custody and evidence preservation best practices.


If you’re passionate about building elegant, scalable user interfaces and want to work on next-generation AI-powered security solutions, we’d love to hear from you!


Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now