Fresenius Medical Care

Creating a future worth living. For patients. Worldwide. Every day.

Principal Cyber Security Analyst - Digital Forensics

Incident Response AnalystSecurity AnalystFull TimeRemoteTeam 10,001+Since 1996H1B SponsorCompany SiteLinkedIn

Location

United States

Posted

6 days ago

Salary

Not specified

Incident ResponseDigital ForensicsPythonPower ShellWindows InternalsLinux InternalsSplunkMicrosoft SentinelAzure LogsAWS LoggingGCP LoggingZeekSuricataWiresharkPCAP AnalysisE DiscoveryEvidence HandlingThreat IntelligenceMalware AnalysisInsider Threat DetectionZero Trust SecuritySaa S ForensicsOkta Audit TrailsEntra ID

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

Fresenius Medical Care’s Cyber Security Operations Center (CSOC) is seeking a highly experienced Principal Analyst. The Principal Cyber Security Analyst specializing in Digital Forensics serves as the senior technical authority for forensic investigations across the enterprise. This role leads complex incident response cases, conducts advanced forensic analysis of endpoints, servers, cloud environments, and networks, and provides strategic insight to reduce organizational risk. The Principal Analyst acts as the highest level escalation point for investigative matters and mentors other analysts in evidence handling, methodology, and tooling. This is a U.S.-based remote position supporting Fresenius Medical Care’s global Cyber Security Operations Center.

Principal Duties and Responsibilities

  • Lead enterprise level forensic investigations involving malware, insider threats, credential compromise, data exfiltration, fraud, and targeted attacks.
  • Act as technical commander during priority incidents, directing scoping, containment, eradication, and root cause analysis in partnership with IR, IT, and Cloud teams.
  • Conduct root cause, impact, and attribution analysis for major cyber events; drive corrective and preventive actions.
  • Lead post-incident reviews and oversee closure of remediation tasks, translating findings into hardening and control improvements.
  • Develop and maintain forensic methodologies, chain of custody procedures, and evidence handling standards.
  • Serve as the primary liaison with Legal, Privacy, HR, and external law enforcement during escalated or sensitive investigations.
  • Correlate forensic artifacts with threat intelligence insights to identify adversaries, campaigns, and TTPs.
  • Establish and maintain forensic readiness strategies, including tooling optimization, logging enhancements, and data retention standards.
  • Develop lightweight tools and scripts (Python/PowerShell) for artifact parsing, timeline generation, triage capabilities, and cloud log normalization.

Qualifications

  • Minimum Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent professional experience).

Requirements

  • 10+ years in Incident Response/DFIR, including leadership of complex, enterprise scale investigations.
  • Cloud & Identity: Sentinel/Splunk, Microsoft 365/Azure logs, AWS/GCP logging, Entra/Okta audit trails.
  • Network: Zeek, Suricata, Brim/Wireshark, PCAP/flow analytics.
  • Experience in evidence handling, legal hold/eDiscovery coordination, and working with Legal/HR/Privacy.
  • Mastery of Windows and Linux internals, authentication flows, common persistence mechanisms, and lateral movement TTPs.
  • Proficient in Python or PowerShell for automation and artifact analysis.
  • Excellent written and verbal communication—able to brief executives clearly under time pressure.

Preferred

  • Industry certifications (one or more): GCFA, GCFE, GNFA, GREM, GCIH, CISA, CISSP, Azure Security, AWS Security.
  • Experience with Zero Trust controls, identity threat detection, and SaaS forensics (O365, Google Workspace).
  • Familiarity with EPSS/SSVC, threat modeling, and purple team/ATT&CK evaluation practices.
  • Background in regulated environments (e.g., healthcare, financial services, manufacturing) and associated audit expectations.

Benefits

  • Comprehensive benefits package including medical, dental, and vision insurance.
  • 401(k) with company match.
  • Paid time off.
  • Parental leave.
  • Potential for performance-based bonuses depending on company and individual performance.

Job Requirements

  • Minimum Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent professional experience).
  • 10+ years in Incident Response/DFIR, including leadership of complex, enterprise scale investigations.
  • Cloud & Identity: Sentinel/Splunk, Microsoft 365/Azure logs, AWS/GCP logging, Entra/Okta audit trails.
  • Network: Zeek, Suricata, Brim/Wireshark, PCAP/flow analytics.
  • Experience in evidence handling, legal hold/eDiscovery coordination, and working with Legal/HR/Privacy.
  • Mastery of Windows and Linux internals, authentication flows, common persistence mechanisms, and lateral movement TTPs.
  • Proficient in Python or PowerShell for automation and artifact analysis.
  • Excellent written and verbal communication—able to brief executives clearly under time pressure.
  • Preferred
  • Industry certifications (one or more): GCFA, GCFE, GNFA, GREM, GCIH, CISA, CISSP, Azure Security, AWS Security.
  • Experience with Zero Trust controls, identity threat detection, and SaaS forensics (O365, Google Workspace).
  • Familiarity with EPSS/SSVC, threat modeling, and purple team/ATT&CK evaluation practices.
  • Background in regulated environments (e.g., healthcare, financial services, manufacturing) and associated audit expectations.

Benefits

  • Comprehensive benefits package including medical, dental, and vision insurance.
  • 401(k) with company match.
  • Paid time off.
  • Parental leave.
  • Potential for performance-based bonuses depending on company and individual performance.

Related Job Pages

More Incident Response Analyst Jobs

Retail Crime Investigator

Weis Markets

Weis Markets is committed to a policy of Equal Employment Opportunity and will not discriminate against an applicant or employee on the basis of actual or perceived age, sex, sexual orientation, race, color, creed, religion, familial status, ethnicity, national origin, citizenship, disability, marital status, military or veteran status, or any other legally recognized protected basis under federal, state or local laws, regulations or ordinances.

Incident Response Analyst7 days ago
Full TimeRemoteTeam 11-50

The associate is responsible for investigating and resolving external theft, including shoplifting and organized retail crime, while gathering and analyzing intelligence on involved individuals and groups. This role also involves documenting information for prosecution, guiding store teams, operating CCTV, conducting surveillance, and acting as a liaison with law enforcement.

InvestigationRetail Loss PreventionCCTV OperationSurveillanceEvidence DocumentationLaw Enforcement LiaisonCriminal Justice
United States
$17 - $27 / hour

Cybersecurity Incident Response Analyst

ServiceNow

As the AI platform for business transformation, we're putting AI to work across organizations — freeing people for work that matters. Making old tech work with new tech. Reaching across departments, from the front office to the back office and every office in between. Our ambition? To become the AI defining enterprise software company of the 21st century (or "AI DESCO21C," as we like to call it). With more than 8,100+ customers, we serve approximately 85% of the Fortune 500®, and we're proud to be a Fortune 100 Best Companies to Work For® and World's Most Admired Companies™. Explore your future career with us, visit www.servicenow.com/careers. From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.

Incident Response Analyst10 days ago
Full TimeRemoteTeam 10,001+Since 2004H1B Sponsor

As a Cybersecurity Incident Response Analyst, you will monitor security tools, respond to threats, and perform forensic analysis on incidents. You'll work with a diverse team to ensure rapid response and continuous improvement in security operations.

AIAWSAzureEdr ToolsGCPLinuxScriptingSiem PlatformsSoar PlatformsWindows
California
$97.6K - $151.3K / year

Incident Response Lead

Teladoc Health

Our mission is to empower all people everywhere to live their healthiest lives by transforming the healthcare experience

Incident Response Analyst12 days ago
Full TimeRemoteTeam 1,001-5,000Since 2002H1B Sponsor

This role involves leading end-to-end cybersecurity incident response activities, from triage and containment through recovery and post-incident review, while also developing and improving response playbooks and procedures. The lead will serve as the primary coordination point during active incidents, mentor junior staff, conduct threat hunting, and manage external firm relationships.

United States
$160K - $170K / year

2nd Shift: Sr. Incident Response III

TEKsystems

We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia.

Incident Response Analyst14 days ago
ContractRemoteTeam 10,001

Individual contributor for second shift focused on proactively finding adversary activities in the network with the goal of discovery before they complete their mission. The ideal candidate would have skills and experience in log analysis, network traffic analysis, and MITRE atta...

United States