×
Register Here to Apply for Jobs or Post Jobs. X

Digital Forensics Response Automation Analyst; DFIR Automation Analyst

Job in Glendale, Maricopa County, Arizona, 85318, USA
Listing for: Bechtel Oil, Gas & Chemicals Incorporated
Full Time position
Listed on 2026-01-24
Job specializations:
  • IT/Tech
    Cybersecurity, Cloud Computing, IT Consultant
Salary/Wage Range or Industry Benchmark: 109190 - 166510 USD Yearly USD 109190.00 166510.00 YEAR
Job Description & How to Apply Below
Position: Digital Forensics Response Automation Analyst (DFIR Automation Analyst)

Job Details:

  • Relocation Authorized:
    None
  • Telework Type:
    Full-Time Telework
  • Work Location:

    Glendale, AZ
  • Salary Range: $109,190 - $166,510 annually (Determined by function, education, experience, and qualifications of the applicant.)
Extraordinary teams building inspiring projects:

Since 1898, we have helped customers complete more than 25,000 projects in 160 countries on all seven continents that have created jobs, grown economies, improved the resiliency of the world's infrastructure, increased access to energy, resources, and vital services, and made the world a safer, cleaner place.

Differentiated by the quality of our people and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers' objectives to create a lasting positive impact. We serve the Infrastructure;
Nuclear, Security & Environmental;
Energy;
Mining & Metals, and the Manufacturing and Technology markets. Our services span from initial planning and investment, through start‑up and operations.

As a DFIR Automation Analyst, you will design and implement automation solutions that enhance core incident response capabilities. Leveraging both commercial and open‑source forensic tools, you will streamline investigative workflows and improve response efficiency. You will also participate in our Incident Command pool and lead incident response efforts as needed. This role requires close collaboration across technical and business teams to refine processes and foster a secure‑by‑design culture.

Strong communication skills are essential, as you’ll engage with stakeholders at all levels—translating complex technical concepts into clear, actionable insights.

Major Responsibilities:
  • Design, implement, and continuously improve our incident response capabilities and modernize Bechtel’s computer forensics operations.
  • Assist efforts to modernize our digital forensics tooling and collection processes while leveraging SOAR, Cloud infrastructure, and CI/CD pipelines.
  • Develop and maintain scripts, playbooks, and integrations for forensic data collection, analysis, and reporting.
  • Conduct forensic investigations across cloud (e.g., AWS, Azure, GCP, SaaS, PaaS, and IaaS) and on‑premise environments to identify, preserve, and analyze evidence.
  • Collaborate with security operations, IT, and engineering teams to identify automation opportunities and implement scalable solutions.
  • Lead and prioritize incident response command staff efforts across the enterprise, including providing forensic analysis support and/or serving as incident commander.
  • Utilize your expert communication skills to produce greater awareness of goals, projects, and tasks amongst customers and stakeholders.
  • Participate in post‑incident reviews and help implement lessons learned into automation strategies.
Education and Experience Requirements:
  • Bachelor's Degree in Information Technology, Computer Science, or a related field or 8 years equivalent experience (in lieu of degree).
  • Must be a United States citizen.
Required Knowledge and

Skills:

  • 5 or more years of general information technology experience with at least 2 of those years in the area of digital forensics or incident response.
  • Familiarity with SOAR (Security Orchestration, Automation, and Response) software with an emphasis on building complex playbooks for automating routine incidents.
  • Familiarity with Incident Response in cloud/hybrid environments (AWS, Azure, GCP, etc).
  • Demonstrated experience with Gitops, CI/CD, and infrastructure as code (IaC) solutions.
  • Demonstrated knowledge of Windows, Mac, and Linux operating systems.
  • Strong working knowledge of Python, Power Shell, or similar scripting languages.
  • Skilled in SIEM/XDR/EDR platforms (e.g., Splunk, Sentinel, Crowd Strike) including log analysis, correlation, and detection tuning.
  • Solid experience applying all facets of digital forensics and incident response to on‑prem and cloud environments.
  • Proven ability to manage yourself, prioritize tasks, and produce high‑quality results in a fast‑paced environment.
  • Able to work across team boundaries, reach consensus amongst disparate viewpoints, and graciously receive feedback.
  • Strong analytical, documentation, and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary