Docusign
Forensic Investigator
DocusignIreland2 days ago
Full-timeRemote FriendlyOther, Information Technology +1
Company Overview

Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).

What you'll do

We are looking for highly motivated and skilled forensic investigators to join our dynamic security team. Reporting directly to the CSIRT Manager, this individual contributor role is crucial for our Detect & Respond function. This role is responsible for conducting in-depth digital forensic analyses of security incidents, including the acquisition, preservation, and analysis of digital evidence. The ideal candidate will identify root causes, support the containment and eradication of threats, participate in an on-call rotation, and perform comprehensive threat hunting activities. Strong technical expertise in various forensic tools and methodologies, along with the ability to communicate findings clearly to technical and operational teams within the CSIRT and broader security organization, is essential. This position requires a proactive approach to identifying security incidents and a readiness to respond to urgent security events.

This position is an individual contributor role reporting to the CSIRT Senior Manager.

Responsibility

  • Lead and participate in the investigation, coordination, and resolution of security incidents
  • Perform comprehensive digital forensic analysis of end-user systems, servers, cloud environments, network devices, and other digital artifacts to identify indicators of compromise (IOCs) and malicious activity
  • Analyze artifacts to trace user activity (e.g. file manipulation, USB activity, browser history, chat analysis, cloud activity)
  • Identify security incidents through proactive Hunting operations within SIEM, EDR, and other relevant security tools
  • Collect, pre-process, capture, and preserve images and other forensic data artifacts, ensuring forensic soundness and integrity
  • Support and coordinate remediation efforts following security incidents
  • Resolve security incidents by identifying root causes and implementing solutions
  • Process massive datasets using specialized forensic software (e.g. FTK, EnCase, Autopsy, Magnet Forensics Axiom, Cellebrite UFED4PC, Physical Analyzer, Endpoint Inspector) to filter, de-duplicate, and prepare data for analysis
  • Perform data extraction and conversion for analysis in various forensic environments
  • Maintain data and documentation according to prescribed chain of custody protocols, ensuring the integrity of forensic evidence for internal analysis and potential external reporting
  • Provide regular reporting and metrics on case work to the CSIRT leadership
  • Develop, maintain, and enforce standard operating procedures (SOPs) for security incident response and digital forensic processes
  • Research new techniques and tools to improve forensic capabilities and incident response efficiency
  • Create requirements and work with stakeholders to design, implement, and deploy security tools to enhance forensic and incident response capabilities
  • Potentially build and maintain robust data pipelines to automate and orchestrate forensic data ingestion and processing within the security ecosystem
  • Communicate technical processes and findings clearly and precisely to CSIRT members, security leadership, and other relevant internal stakeholders, including writing fact-based reports on forensic data analysis
  • Interface and connect with system owners, IT contacts, and other internal teams to pursue security incident response activities, including obtaining system access, digital artifact collection, and containment/remediation actions
  • Provide consultation and assessment on perceived security threats
  • Establish consultative relationships with internal stakeholders, guiding them toward best practices in data and evidence handling for security investigations

Job Designation

Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation)

Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.

What you bring

Basic

  • 5+ years of hands-on experience in cybersecurity, with a focus on incident response and computer forensics analysis
  • Experience with cybersecurity principles, incident response lifecycles, and security best practices
  • Experience with forensic tool suites such as Sumuri, Magnet Forensics Axiom, Velociraptor, and X-ways
  • Experience in digital evidence handling and forensic analysis across various operating systems (Windows, Unix/Linux) and environments (endpoint, server, cloud)
  • Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlation
  • Experience with EDR and SIEM technologies (i.e., Splunk) for threat hunting and incident identification
  • Experience in programming languages such as Python for scripting, automating forensic tasks, and potentially building data pipelines for security data
  • Experience communicating technical information clearly and precisely to technical and non-technical audiences
  • Experience managing multiple complex investigations simultaneously with attention to detail and accuracy

Preferred

  • Experience with big data frameworks like Apache Spark and Kafka for processing and streaming large volumes of security-related data
  • Programming skills in PowerShell and/or C/C++
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • Training and/or certifications from industry organizations or vendors (i.e., GCFE, GCFA, GREM, GCIH, EnCE, CISSP)
  • Hands-on experience with SOAR platforms
  • Strong analytical and problem-solving skills, with a keen eye for detail
  • Knowledge of how to protect against AI threats
  • Ability to be on-call for global incident response as required

Life at Docusign

Working here

Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal.

We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live.

Accommodation

Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at [email protected].

If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at [email protected] for assistance.

Applicant and Candidate Privacy Notice

Key Skills

Ranked by relevance