Forensics Analyst - ITGP


IT - CA - Los Angeles, CA
Los Angeles, California
Locations: Los Angeles, Oakland, Pasadena, Cedar Park
Posted On: July 31, 2025
Last Day to Apply: August 14, 2025
Pay: From $60.00 per hour

Job Title: Forensics Analyst 
Location: Remote 
Contract Duration: 6 Months 
Employment Type: Contract 

Position Overview: 

We are seeking a skilled Forensics Analyst to join our remote team on a 6-month contract. The ideal candidate will be responsible for performing comprehensive digital forensic investigations involving system artifacts, memory, file systems, email, malware, and social media forensics. This role plays a crucial part in identifying, analyzing, and documenting cybersecurity incidents while maintaining the integrity of evidence throughout the investigative process. 

Key Responsibilities: 

  • Conduct in-depth digital forensic analysis, including acquisition and examination of: 
  • Emails 
  • Memory dumps 
  • File systems 
  • Logs 
  • Registry 
  • User activity 
  • Malware samples 
  • Browser histories 
  • Social media activity 
  • Anti-forensic techniques 
  • Collect and preserve digital evidence following legal and procedural standards. 
  • Analyze and correlate digital artifacts to build timelines and understand incident root cause. 
  • Maintain and document a defensible chain of custody for all acquired data and devices. 
  • Prepare detailed and accurate incident reports, findings, and risk assessments for internal teams and stakeholders. 
  • Stay updated on emerging cyber threats, attack techniques, and digital forensic methodologies. 
  • Collaborate with security, legal, and compliance teams to support internal investigations and regulatory inquiries. 

Required Qualifications: 

  • 3+ years of experience in digital forensics or incident response. 
  • Proficiency in forensic tools such as EnCase, FTK, Autopsy, X-Ways, Volatility, or Magnet AXIOM. 
  • Solid understanding of Windows, Linux, and Mac file systems, registry analysis, and network log interpretation. 
  • Experience with malware analysis, memory forensics, and data recovery techniques. 
  • Strong verbal and written communication skills, including technical reporting. 
  • Ability to manage sensitive investigations and maintain confidentiality. 

Preferred Qualifications: 

  • Relevant certifications such as GCFA, GCFE, CCE, EnCE, or CFCE. 
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation or analysis tasks. 
  • Experience in law enforcement, military, or enterprise-level security operations a plus. 
Skip to the main content