Cyber Forensic Analyst

Position summary




Cyber Forensic Analyst I – Insider Threat and Risk

About the Information Security and IT Risk Management Organization:  


The organization is charged with enabling the business through globally delivered IT Risk Management and Information Security services aligned to the enterprise risk and threat profile. Accountable for maintaining a secure organization through strategic alignment, structured governance, process operation and enterprise reporting.

About the role:


The Cyber Forensic Analyst Level is a member of the Cyber Forensics team in the GM Insider Threat and Risk organization. The Cyber Forensics Team will be responsible for managing the collection of electronically stored information (ESI) and digital evidence, coordination of cyber investigations across GM business units and suppliers, detailed forensic analysis of evidence collected, interaction with Legal, HR and GM Audit Services in providing forensic guidance for incident response, e-discovery, and litigation support.


The Cyber Forensics Analyst will work closely with team members in the Cyber Forensics team and aid in performing in-depth forensic analysis of the following:


  • End-User IT Platform Analysis
  • Mobile Devices, SharePoint, Email, SMTP, Internet History (Proxies, Firewalls), VPN, Server Logs, Active Directory, Critical Data Recovery, Digital Asset, e-Discovery preservation Imaging – Hard drives; External storage devices; cell phones
  • Computer Related Theft of Intellectual Property
  • Detection of digital theft of proprietary data sent to personal email via file transfers and other electronic means (*includes existing DLP capability)


  • Mass  Deletions, Targeted Deletions and Wiping of Computerized Data
  • Forensic analysis of data shredding and wiping on a computer or mobile device subject to preservation and examination
  • Forensic Investigation Case Management, Reporting and Metrics
  • Chain of Custody
  • Investigative Case Reporting
  • Investigation Metrics



  • Database Forensics
  • Preserving, authenticating, analyzing, and accurately producing data from enterprise databases
  • CIRT Post-Incident Forensics
  • Post-containment forensic analysis of Cyber Intrusion Incidents
  • Social Network Forensics
  • Forensic analysis of Social Networking platforms



Major responsibilities include:

– Assist in the development of forensic methodologies

– Coordinate with internal and external legal counsel as requested

– Collecting, analyzing, and interpreting forensic evidence including but not limited to Network, Client and Server platforms

– Assist in the design and creation of an efficient investigative methodology based on legal guidelines and industry best practices

– Ensure evidence collection procedures that align with internal policies, processes and procedures

– Provide technical guidance and support for internal investigative and e-Discovery/Legal

The policy of General Motors is to extend opportunities to qualified applicants and employees on an equal basis regardless of an individual’s age, race, color, sex, religion, national origin, disability, sexual orientation, gender identity/expression or veteran status. Additionally, General Motors is committed to being an Equal Employment Opportunity Employer and offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email us at In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying.

Minimum Qualifications:


  • Minimum 5 years’ experience in information security and information technology
  • Minimum 3 years’ experience in computer forensics and digital investigations
  • Very strong verbal and written communication skills
  • Strong organizational and problem solving skills
  • Strong business, leadership, and management skills
  • Ability to work collaboratively with individuals within both the technical community and senior IT leadership

Preferred Qualifications:


  • Bachelor’s and/or Master’s degree in Forensics, Computer Science or related field
  • Ability to acquire DHS/DOD security clearance
  • EnCE, CISSP Certification
  • Member of security and investigative organizations (HTCIA, Infragard, ISSA, etc.)
  • Demonstrated experience in collecting and analyzing digital evidence in a forensically sound manner across multiple platforms (Networks, databases, mobile, servers and clients)


. . . . . . . .

Leave a Reply