Security Response Technical Investigator

Website tesla Tesla

Tesla’s mission is to accelerate the world’s transition to sustainable energy.

The Security Response Technical Investigator is responsible for responding to security incidents, investigating security matters, and collecting information via technical means regarding threats to the company. The role will assist the Manager, Security Response to deploy and sustain an enterprise-wide strategy for both investigative/intelligence resource optimization and procedures in addition to operational effectiveness. The role will work to maintain a proactive, operational and business aligned culture and approach to Tesla Global Security.

Responsibilities
• Conduct sound forensic examinations of electronic devices in the furtherance of investigations and company legal requests
• Work closely with security response investigators to integrate technical and human investigations into one high efficiency function
• Work closely with security analysts to identify security threats and address gaps in information
• Thoroughly investigate security incidents that fall within the purview of Security Response
• Produce professional reports suitable for dissemination to senior leadership, legal counsel and outside law enforcement detailing investigative and operational results
• Partner with Legal and Human Resources and other investigative/analysis functions across the company to ensure timely completion of investigations
• Advise the company on the findings of investigations and liaise with law enforcement as necessary 

• Conduct highly sensitive, complex, and confidential insider threat investigations into incidents of data loss and intellectual property theft, technology misuse, and conflict of interest
• Conduct proactive efforts to identify, exploit, disrupt, or protect against any undermining of Tesla’s business operations
• Will be required to solve complex problems with data from multiple sources and make recommendations to leadership on the appropriate strategy
• Must effectively communicate at all levels of the company 

Requirements
• Bachelor’s degree required
• 3+ years experience working in cyber investigations, computer forensics, financial fraud investigations and/or other IT related fields tied to information security
• Working knowledge of the following tools: |
o HIPS
o Web Proxy
o SQL
o Open Source Intelligence
o Memory Analysis
o Syslog from servers and network devices
o DHCP, AD, 802.1x, NAT, and VPN logs
o Passive DNS
o SIEM/Log Management systems
o Encase/FTK/MantaRay/Axiom
• Independently leverage technical tools and techniques to conduct and support security response investigations
• Analyze complex data sets to detect patterns and anomalies
• Quickly learn and implement new technologies to further organizational goals
o Open Source Intelligence
o Memory Analysis
o Syslog from servers and network devices
o DHCP, AD, 802.1x, NAT, and VPN logs
o Passive DNS
o SIEM/Log Management systems
o Encase/FTK/MantaRay/Axiom
• Experience in conducting and overseeing complex, global, investigations is preferred
• Demonstrated knowledge of corporate investigation strategies utilizing technical forensic capabilities and data
• Experience investigating complex technical security incidents, highly sensitive employee matters, and insider threat assessment and management is required
• Demonstrated experience of regular communication at executive level within a global corporate environment
• Proven track record managing multiple complex projects simultaneously, and focusing on critical priorities with little or no supervision
• Approximately 10-30% global travel required
• Understanding of internet infrastructure (DNS, IP addressing, routing)
• Knowledge of E-Discovery and chain of custody best practices and techniques

Scroll to top