Allstate
Level 3 Digital Forensics and Incident Response Analyst
Key aspects of the role:
- Drive sales growth by engaging with interested prospective customers- all while working remote
- No cold calling— Connect through inbound calls and proactive outbound calls with active insurance shoppers
- Enjoy competitive compensation with a base salary + uncapped commissions
- Sell reputable products from Allstate and our family of brands
At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.
Job Description
We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team.
This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk (“dead box”) acquisition efforts alongside senior team members.
You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it.
Key Responsibilities
Incident Response & Digital Forensics
-
Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes.
-
Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks.
-
Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster.
-
Mentor fellow SOC analysts and act as a go-to person for tough security challenges.
-
Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving.
-
Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats.
-
Perform network, disk, system files and memory forensic analysis.
-
Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure.
-
Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences.
-
Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks.
-
Define and assist in creation of operational and executive reports
-
Constantly stay connected with teammates and partners to share insights and improve how we respond to threats.
Required Qualifications
-
7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics.
-
Extensive experience in Incident Response, Incident Handling and Security Operations.
-
Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures.
-
Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
-
Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmerman's tools.
-
Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
-
Practical knowledge of MITRE ATT&CK and threat actor TTPs.
-
Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek.
-
Familiarity with common scripting languages (Python, PowerShell, Bash) for automating investigations and tool integration.
-
Strong written and verbal communication skills, especially in producing high-quality reports and briefings.
Preferred Qualifications
-
Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform.
-
Reverse engineering skills or familiarity with dynamic/static malware analysis techniques.
-
Development or tuning of detection rules (e.g., Sigma, Snort, Suricata, YARA).
-
Experience working in large enterprise or multi-tenant environments.
-
Cybersecurity certifications such as: GCFA, GCIH, GNFA, GREM, GCIA, CISSP, OSCP, or similar.
-
Working knowledge of security frameworks and compliance standards such as NIST 800-61, MITRE D3FEND, ISO 27001, HIPAA, PCI-DSS.
#LI-JJ1
Skills
Cybersecurity, Digital Forensics, Endpoint Detection and Response (EDR), Incident Response, Log Analysis, Scripting, Security Information and Event Management (SIEM), Security Monitoring, Security Operations, Technical Reporting
Compensation
Compensation offered for this role is $112,000.00 – 196,750.00 annually and is based on experience and qualifications.
The candidate(s) offered this position will be required to submit to a background investigation.
Joining our team isn’t just a job — it’s an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to you. Joining our team means being part of something bigger – a winning team making a meaningful impact.
Allstate generally does not sponsor individuals for employment-based visas for this position.
Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component.
For jobs in San Francisco, please click “here” for information regarding the San Francisco Fair Chance Ordinance.
For jobs in Los Angeles, please click “here” for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance.
To view the “EEO is the Law” poster click “here”. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs
To view the FMLA poster, click “here”. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint.
It is the Company’s policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee’s ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.
At Allstate, it’s all about teamwork, flexibility, and thinking ahead. We all contribute to the bigger picture, combining unique ideas to design innovative, more affordable protection solutions for customers.
We look for candidates with these skills to help us achieve that goal:
Learning agility
Quickly adapt to new situations, continually build new skills, experiment, and embrace new ways of doing things
Customer centricity
Deliver exceptional experience with a customer-first mindset and human-centered design
Digital literacy
Discover and apply emerging digital technology tools, data and insights.
Results-oriented
Start with measurable outcomes and drive results with speed
Inclusive leadership
Integrate diverse viewpoints into decision-making processes to enhance creativity and innovation
Together, we’re all working toward Our Shared Purpose, using our strengths to make a real difference for our people, our customers, our company, and the world around us.
What We Do:
As an expert on our products and services, you can give customers personalized attention and innovative solutions to make their lives easier.
How We Support You:
Starting day one, you’ll have access to resources and incentives to keep you feeling challenged and excited about your careers.
Make An Impact:
As a member of our sales team, you’ll bring a sense of ease and support to customers looking for a better understanding of their protection options. Whether in the field or talking to customers over the phone, you’ll continue to build trust in who we are and what we do.
You’re in Good Hands® is more than a promise we make to our customers. It’s a promise we make to our employees, too.
We want you to love where you work. That starts with the freedom to be yourself. Our workplace flexibility and focus on individuality means everyone is seen, heard and respected.
When you join us, you’ll have the opportunity to push your skills to the next level with access to development programs to support your career aspirations – whatever that means for you. Because as you learn and grow, so do we.
Working here also means getting the chance to make a real impact in your community. We have been driving change for over 90 years, but the mark we leave on the world can be even greater when we work together.
At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.
Job Description
We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team.
This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk (“dead box”) acquisition efforts alongside senior team members.
You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it.
Key Responsibilities
Incident Response & Digital Forensics
-
Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes.
-
Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks.
-
Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster.
-
Mentor fellow SOC analysts and act as a go-to person for tough security challenges.
-
Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving.
-
Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats.
-
Perform network, disk, system files and memory forensic analysis.
-
Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure.
-
Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences.
-
Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks.
-
Define and assist in creation of operational and executive reports
-
Constantly stay connected with teammates and partners to share insights and improve how we respond to threats.
Required Qualifications
-
7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics.
-
Extensive experience in Incident Response, Incident Handling and Security Operations.
-
Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures.
-
Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
-
Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmerman's tools.
-
Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
-
Practical knowledge of MITRE ATT&CK and threat actor TTPs.
-
Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek.
-
Familiarity with common scripting languages (Python, PowerShell, Bash) for automating investigations and tool integration.
-
Strong written and verbal communication skills, especially in producing high-quality reports and briefings.
Preferred Qualifications
-
Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform.
-
Reverse engineering skills or familiarity with dynamic/static malware analysis techniques.
-
Development or tuning of detection rules (e.g., Sigma, Snort, Suricata, YARA).
-
Experience working in large enterprise or multi-tenant environments.
-
Cybersecurity certifications such as: GCFA, GCIH, GNFA, GREM, GCIA, CISSP, OSCP, or similar.
-
Working knowledge of security frameworks and compliance standards such as NIST 800-61, MITRE D3FEND, ISO 27001, HIPAA, PCI-DSS.
#LI-JJ1
Skills
Cybersecurity, Digital Forensics, Endpoint Detection and Response (EDR), Incident Response, Log Analysis, Scripting, Security Information and Event Management (SIEM), Security Monitoring, Security Operations, Technical Reporting
Compensation
Compensation offered for this role is $112,000.00 – 196,750.00 annually and is based on experience and qualifications.
The candidate(s) offered this position will be required to submit to a background investigation.
Joining our team isn’t just a job — it’s an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to you. Joining our team means being part of something bigger – a winning team making a meaningful impact.
Allstate generally does not sponsor individuals for employment-based visas for this position.
Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component.
For jobs in San Francisco, please click “here” for information regarding the San Francisco Fair Chance Ordinance.
For jobs in Los Angeles, please click “here” for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance.
To view the “EEO is the Law” poster click “here”. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs
To view the FMLA poster, click “here”. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint.
It is the Company’s policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee’s ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.
At Allstate, it’s all about teamwork, flexibility, and thinking ahead. We all contribute to the bigger picture, combining unique ideas to design innovative, more affordable protection solutions for customers.
We look for candidates with these skills to help us achieve that goal:
Learning agility
Quickly adapt to new situations, continually build new skills, experiment, and embrace new ways of doing things
Customer centricity
Deliver exceptional experience with a customer-first mindset and human-centered design
Digital literacy
Discover and apply emerging digital technology tools, data and insights.
Results-oriented
Start with measurable outcomes and drive results with speed
Inclusive leadership
Integrate diverse viewpoints into decision-making processes to enhance creativity and innovation
Together, we’re all working toward Our Shared Purpose, using our strengths to make a real difference for our people, our customers, our company, and the world around us.
What We Do:
Your ability to quickly and calmly make smart decisions can make a huge difference in how confident customers feel throughout the claims process. And as you support our customers, we’re there to support you.
How We Support You:
We empower your success starting day one. You’ll have access to everything you need to grow professionally while helping our customers get their lives back on track.
Make An Impact:
Helping customers with their claims is about learning their stories, not just processing their paperwork. You can take pride in the fact that you’re providing invaluable guidance and helping to build continued trust in our company.
You’re in Good Hands® is more than a promise we make to our customers. It’s a promise we make to our employees, too.
We want you to love where you work. That starts with the freedom to be yourself. Our workplace flexibility and focus on individuality means everyone is seen, heard and respected.
When you join us, you’ll have the opportunity to push your skills to the next level with access to development programs to support your career aspirations – whatever that means for you. Because as you learn and grow, so do we.
Working here also means getting the chance to make a real impact in your community. We have been driving change for over 90 years, but the mark we leave on the world can be even greater when we work together.
At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection.
Job Description
We’re seeking an experienced and adaptable Cybersecurity professional with solid digital forensics background to join our Global Security Fusion Center (GSFC) team.
This is a Level 3 Digital Forensics & Incident Response Analyst role built for someone who thrives on diving into complex investigations, leading containment and remediation efforts, and guiding junior analysts as they grow into their own. The day-to-day centers on incident response, but we’re after someone who can also bring hands-on forensics skills into the mix—someone comfortable contributing to live-box and on-demand artifact collection and, when needed, stepping into full disk (“dead box”) acquisition efforts alongside senior team members.
You’ll work side by side with our Threat Intel, Engineering, and Threat Hunting teams—shaping detection strategies, pinpointing root causes, and turning insight into action. It’s a high-impact role built for someone who’s deeply passionate about incident response and ready to lean into forensics when the mission calls for it.
Key Responsibilities
Incident Response & Digital Forensics
-
Lead deep-dive investigations into complex security incidents, tracing attack paths and uncovering root causes.
-
Handle high-severity threats from start to finish — escalating, analyzing, and making sure nothing slips through the cracks.
-
Work side-by-side with engineers to improve detection rules and integrate new tools that make our security smarter and faster.
-
Mentor fellow SOC analysts and act as a go-to person for tough security challenges.
-
Help shape and refine SOC workflows, ensuring our processes are clear, effective, and constantly improving.
-
Dive into large volumes of security data to spot patterns, build custom tools, and uncover hidden threats.
-
Perform network, disk, system files and memory forensic analysis.
-
Collaborate on long-term security strategies, offering ideas to strengthen policies, tools, and infrastructure.
-
Coordinate the collection of evidence and help document findings clearly for both technical and non-technical audiences.
-
Bring deep expertise across areas like forensics, log analysis, incident response, operating systems, and networks.
-
Define and assist in creation of operational and executive reports
-
Constantly stay connected with teammates and partners to share insights and improve how we respond to threats.
Required Qualifications
-
7+ years of hands-on experience in Cybersecurity, with 5+ years specifically in Incident Response and/or Digital Forensics.
-
Extensive experience in Incident Response, Incident Handling and Security Operations.
-
Strong knowledge of Windows and Linux internals, including registry, system logs, file systems, and memory structures.
-
Proficiency with EDR/XDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint).
-
Familiarity with modern forensic tools such as Magnet AXIOM, F-Response, Velociraptor, Autopsy, KAPE, or Eric Zimmerman's tools.
-
Experience with SIEM platforms (e.g., Splunk, Sentinel, Elastic, Chronicle) for threat detection and analysis.
-
Practical knowledge of MITRE ATT&CK and threat actor TTPs.
-
Experience analyzing PCAPs and network traffic using tools such as Wireshark or Zeek.
-
Familiarity with common scripting languages (Python, PowerShell, Bash) for automating investigations and tool integration.
-
Strong written and verbal communication skills, especially in producing high-quality reports and briefings.
Preferred Qualifications
-
Experience in cloud-native security monitoring and incident response in environments like AWS, Azure, or Google Cloud Platform.
-
Reverse engineering skills or familiarity with dynamic/static malware analysis techniques.
-
Development or tuning of detection rules (e.g., Sigma, Snort, Suricata, YARA).
-
Experience working in large enterprise or multi-tenant environments.
-
Cybersecurity certifications such as: GCFA, GCIH, GNFA, GREM, GCIA, CISSP, OSCP, or similar.
-
Working knowledge of security frameworks and compliance standards such as NIST 800-61, MITRE D3FEND, ISO 27001, HIPAA, PCI-DSS.
#LI-JJ1
Skills
Cybersecurity, Digital Forensics, Endpoint Detection and Response (EDR), Incident Response, Log Analysis, Scripting, Security Information and Event Management (SIEM), Security Monitoring, Security Operations, Technical Reporting
Compensation
Compensation offered for this role is $112,000.00 – 196,750.00 annually and is based on experience and qualifications.
The candidate(s) offered this position will be required to submit to a background investigation.
Joining our team isn’t just a job — it’s an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. One where you can shape the future of protection while supporting causes that mean the most to you. Joining our team means being part of something bigger – a winning team making a meaningful impact.
Allstate generally does not sponsor individuals for employment-based visas for this position.
Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component.
For jobs in San Francisco, please click “here” for information regarding the San Francisco Fair Chance Ordinance.
For jobs in Los Angeles, please click “here” for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance.
To view the “EEO is the Law” poster click “here”. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs
To view the FMLA poster, click “here”. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint.
It is the Company’s policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee’s ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.
At Allstate, it’s all about teamwork, flexibility, and thinking ahead. We all contribute to the bigger picture, combining unique ideas to design innovative, more affordable protection solutions for customers.
We look for candidates with these skills to help us achieve that goal:
Learning agility
Quickly adapt to new situations, continually build new skills, experiment, and embrace new ways of doing things
Customer centricity
Deliver exceptional experience with a customer-first mindset and human-centered design
Digital literacy
Discover and apply emerging digital technology tools, data and insights.
Results-oriented
Start with measurable outcomes and drive results with speed
Inclusive leadership
Integrate diverse viewpoints into decision-making processes to enhance creativity and innovation
Together, we’re all working toward Our Shared Purpose, using our strengths to make a real difference for our people, our customers, our company, and the world around us.
You’re in Good Hands® is more than a promise we make to our customers. It’s a promise we make to our employees, too.
We want you to love where you work. That starts with the freedom to be yourself. Our workplace flexibility and focus on individuality means everyone is seen, heard and respected.
When you join us, you’ll have the opportunity to push your skills to the next level with access to development programs to support your career aspirations – whatever that means for you. Because as you learn and grow, so do we.
Working here also means getting the chance to make a real impact in your community. We have been driving change for over 90 years, but the mark we leave on the world can be even greater when we work together.
Benefits
Experience the benefits that make Allstate a great place to work.
*Benefits vary based on position.
- Medical, dental and vision coverage
- HSAs and FSAs
- Wellbeing programs
- Free therapy sessions
- 401(k) plan
- Pension plan
- Free financial counseling
- Paid time off
- Work flexibility
- Talent shares
- Tuition reimbursement
- Learning opportunities
For a full description of Allstate’s benefits visit our benefits page
Start making a difference
Realize your full potential by doing
work that matters.
Grow your career in meaningful ways.
We want to make sure you have every opportunity to grow, explore new horizons and follow your passion in a meaningful career. It’s an exciting time to join Allstate. Help us shape the future.