Sr. Specialist - Fraud Investigation
Role Description
Role Description:
Concentrix Corporation is seeking a highly skilled Security Investigator to join our team, focusing on the identification, analysis, and response to security threats on behalf of a well-known travel client. This role requires a deep understanding of security principles and advanced investigation and response capabilities. You will provide a corporate response to independently provide analysis, conduct log reviews and lead complex and sensitive internal investigations that may include fraud, insider threat, data and IT security incidents. This role will offer the opportunity to work with key stakeholders and senior management as well as liaising with Law Enforcement.
This position will initially be on a 90/180 day fixed term contract with the possibility of an extension.
Responsibilities:
Every day as an IR&C Investigations team member is unique and depending on the day you will…
- Lead efforts in alert triage and threat response by developing strategies to recognize attack patterns and effectively filter false positives/negatives.
- Conduct investigations end to end including analysis of allegations, log reviews, designing investigation and interviews plans, collect documentary evidence, conduct investigation interviews, and hold meetings with senior management.
- Manage and prioritize a caseload of multiple investigations and prepare and maintain appropriate case files/documentation for each, including timely maintenance and updating of appropriate case management systems in-line with internal protocols.
- Conduct open-source intelligence (OSINT) research to support investigations.
- Effectively and sensitively interact and communicate with individuals involved in the case, managing the expectations of the client, business leaders, executives and affected employees.
- Author detailed professional investigation reports that contain objective and sound findings and provide advice regarding corrective action as well as preventive action to improve internal controls.
- Collaborate with other IR&C team members to conduct investigations. Work with other investigative partners on security and investigative enhancements and process improvement initiatives.
- Maintain strict discretion and confidentiality regarding assignments and investigations.
- Partner with other business units to develop and deliver employee training to maintain fraud and security awareness and minimize incidents.
- Be flexible with work hours, as you may be required to respond to critical investigative matters that may fall outside of your pre-scheduled working hours.
- Be open to travel as it may be required.
Accountability:
- Security Understanding and Foundations:
- Apply core security concepts, focusing on the CIA Triad – Confidentiality, Integrity, and Availability.
- Utilize key principles and models such as Authentication, Authorization, Zero Trust, and Defence in Depth.
- Analyze risk and threat concepts including Vulnerabilities, Threats, Exploits, and Risks.
- Networking Proficiency:
- Master networking fundamentals, particularly TCP/IP.
- Implement and manage security protocols including SSL/TLS, HTTPS, DNS, SSH, and Ipsec.
- Leverage resources such as Cisco’s Introduction to Networking for continued learning.
- Operating Systems Expertise:
- Ensure a broad and deep understanding of various operating systems such as ChromeOS, Windows, MacOS, and Linux within the team.
Desired Skills:
- Investigative experience as a corporate investigator or Law Enforcement professional with a minimum of 7 years or more of experience in investigative practices, including: conducting interviews; locating, reviewing, and analyzing data; preserving evidence; and producing cohesive and thorough written investigation reports.
- Experience interfacing with local, state, federal or international law enforcement agencies.
- Experience with producing basic statistics and case analysis data in a standard case management system.
- Experience in fundamental business skills; proficiency in standard office software programs, such as word processing, spreadsheets, presentation software, and collaboration tools (Teams, Outlook, Zoom, etc.)
- Proven experience in security analysis and incident response.
- Experience in multidisciplinary threat assessment methodology.
- In-depth knowledge of security frameworks and protocols.
- Strong analytical and problem-solving skills.
- Cyber security awareness and experience in conducting computer-related investigations.
- Certifications in Comp TIA, GIAC, CISM, CISSP, PCI, CPP, CTM, CFE and/or CFI.