Logo for Fresenius Medical Care North America

Principal Analyst Cyber Security Ops - Digital Forensics

Roles & Responsibilities

  • 10+ years in Incident Response/DFIR, including leadership of complex, enterprise-scale investigations
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent professional experience)
  • Proficiency in Python or PowerShell for automation and artifact analysis
  • Advanced knowledge of Windows and Linux internals, authentication flows, common persistence mechanisms, and lateral movement TTPs

Requirements:

  • Lead enterprise-level forensic investigations involving malware, insider threats, credential compromise, data exfiltration, fraud, and targeted attacks; act as technical commander during priority incidents, directing scoping, containment, eradication, and root-cause analysis in partnership with IR, IT, and Cloud teams
  • Conduct root cause, impact, and attribution analysis for major cyber events; drive corrective and preventive actions; lead post-incident reviews and oversee closure of remediation tasks, translating findings into hardening and control improvements
  • Develop and maintain forensic methodologies, chain-of-custody procedures, and evidence-handling standards; establish forensic-readiness strategies including tooling optimization, logging enhancements, and data retention standards
  • Develop lightweight tools and scripts (Python/PowerShell) for artifact parsing, timeline generation, triage capabilities, and cloud-log normalization; mentor threat engineers and SOC analysts globally; serve as primary liaison with Legal, Privacy, HR, and external law enforcement during escalated or sensitive investigations

Job description

The rate of pay for this position will depend on the successful candidate’s work location and qualifications, including relevant education, work experience, skills, and competencies. Annual Rate: $117,700.00 - $196,200.00 for  Waltham, MA location

Benefit Overview: This position offers a comprehensive benefits package including medical, dental, and vision insurance, a 401(k) with company match, paid time off, parental leave and potential for performance-based bonuses depending on company and individual performance.

PURPOSE AND SCOPE:  

Fresenius Medical Care’s Cyber Security Operations Center (CSOC) is seeking a highly experienced Principal Analyst The Principal Cyber Security Analyst specializing in Digital Forensics serves as the senior technical authority for forensic investigations across the enterprise. This role leads complex incident response cases, conducts advanced forensic analysis of endpoints, servers, cloud environments, and networks, and provides strategic insight to reduce organizational risk. The Principal Analyst acts as the highestlevel escalation point for investigative matters and mentors other analysts in evidence handling, methodology, and tooling. 

This is a U.S.-based remote position supporting Fresenius Medical Care’s global Cyber Security Operations Center. 

PRINCIPAL DUTIES AND RESPONSIBILITIES:  

  • Lead enterpriselevel forensic investigations involving malware, insider threats, credential compromise, data exfiltration, fraud, and targeted attacks. 

  • Act as technical commander during priority incidents, directing scoping, containment, eradication, and rootcause analysis in partnership with IR, IT, and Cloud teams. 

  • Conduct rootcause, impact, and attribution analysis for major cyber events; drive corrective and preventive actions. 

  • Lead postincident reviews and oversee closure of remediation tasks, translating findings into hardening and control improvements. 

  • Develop and maintain forensic methodologies, chainofcustody procedures, and evidencehandling standards. 

  • Serve as the primary liaison with Legal, Privacy, HR, and external law enforcement during escalated or sensitive investigations. 

  • Correlate forensic artifacts with threatintelligence insights to identify adversaries, campaigns, and TTPs. 

  • Establish and maintain forensicreadiness strategies, including tooling optimization, logging enhancements, and dataretention standards. 

  • Develop lightweight tools and scripts (Python/PowerShell) for artifact parsing, timeline generation, triage capabilities, and cloudlog normalization. 

PHYSICAL DEMANDS AND WORKING CONDITIONS

  • The physical demands and work environment characteristics represent those typically encountered while performing essential duties. Reasonable accommodation may be made as needed. 
    This is a remote role with availability expected during core hours and during escalations as required. 

SUPERVISION:  

  • Provides technical leadership and mentorship to threat engineers and SOC analysts globally. Does not directly manage staff. 

 EDUCATION:  

  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent professional experience). 

EXPERIENCE AND REQUIRED SKILLS  

  • 10+ years in Incident Response/DFIR, including leadership of complex, enterprise scale investigations.  

  • Cloud & Identity: Sentinel/Splunk, Microsoft 365/Azure logs, AWS/GCP logging, Entra/Okta audit trails. 

  • Network: Zeek, Suricata, Brim/Wireshark, PCAP/flow analytics. 

  • Experience in evidence handling, legal hold/eDiscovery coordination, and working with Legal/HR/Privacy.  

  • Mastery of Windows and Linux internals, authentication flows, common persistence/mechanisms, and lateral movement TTPs.  

  • Proficient in Python or PowerShell for automation and artifact analysis.  

  • Excellent written and verbal communication—able to brief executives clearly under time pressure. 

Preferred: 

  • Industry certifications (one or more): GCFA, GCFE, GNFA, GREM, GCIH, CISA, CISSP, Azure Security, AWS Security.  

  • Experience with Zero Trust controls, identity threat detection, and SaaS forensics (O365, Google Workspace).  

  • Familiarity with EPSS/SSVC, threat modeling, and purpleteam/ATT&CK evaluation practices.  

  • Background in regulated environments (e.g., healthcare, financial services, manufacturing) and associated audit expectations. 

Fresenius Medical Care maintains a drug-free workplace in accordance with applicable federal and state laws.

Fresenius Medical Care is an equal opportunity employer and does not discriminate on the basis of race, color, religion, sexual orientation, gender identity, parental status, national origin, age, disability, military service, or other non-merit-based factors

Cybersecurity Analyst Related jobs

Other jobs at Fresenius Medical Care North America

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.