Job Overview
Our mirrors the analyst experience to give you an understanding of our business and experience project work at Charles River Associates.
Throughout the 8-10 week program, Analyst / Associate Interns work alongside senior colleagues to deliver live client consulting projects within the practice area.
Along the way, you’ll benefit from professional development and wellness support programs, social events to connect you with peers and a collegial work environment.
Successful interns will be offered a full-time position following graduation.
During the Cyber and Forensic Technology Analyst / Associate Internship program, you may work on many aspects of a project :
- Assist with security and privacy investigations in response to data security matters, which may include ongoing breaches and fraud;
- Engage in problem solving and forensic analysis of digital information using standard computer forensic and evidence handling techniques and tools;
- Apply investigative techniques, scientific reasoning, and digital forensic techniques against various systems to answer questions;
- Identify, research, and organize information to determine what a hacker did to a compromised system, whether data was stolen from a company asset, or what data to assess and provide in a litigation;
- Defensibly collect digital evidence and complete chain-of-custody documentation;
- Leverage your programming, model building, and database administration skills (including using Python, T-SQL, VBA, Excel, C#, and / or other programming languages and tools);
- Share investigative and analytical findings, and assist with the drafting of written reports to summarize procedures performed and findings;
- Stay current with developments in digital forensics, e-discovery, and incident response.
Learn more about our work by reviewing our Services and Industries on our .
Qualifications
- Bachelor’s or Master’s (non-MBA) degree candidates graduating December 2025 / Summer 2026 with a relevant academic focus (Cybersecurity, Computer Science and Engineering, Digital Forensics, Management Information Systems, or Security Information Systems or related);
- Familiarity with several core skills : Strong understanding of computer operating systems, software, and hardware;Ability to conduct detailed forensic investigations and analyses of computers, networks, mobile devices, and removable media;
- Experience with conducting digital forensic analyses using commercial and open-source forensic tools, including file system forensics, memory analysis, and network analysis;
- Experience with conducting static / dynamic malware analyses in a lab environment and threat hunting in a live environment;
- Understanding of proper evidence handling procedures and chain-of-custody;Experience with drafting technical and investigative reports and communicating technical findings;
- Experience with utilizing automation tools and scripts to expedite analyses;Understanding of incident handling procedures, including preparation, identification, containment, eradication and recovery-to-protect enterprise environments;
- Understanding of common attack techniques used by an adversary on a victim network and how to leverage those techniques to stop further adversary activity;
Individuals with digital forensics / incident response training and / or certifications, including SANS GIAC (GCIA, GCFA, GCFE, GNFA, GCCC, and / or GREM), IACIS (CFCE or CIFR), and / or Guidance Software (EnCE), are preferred but not required.
- Effective written and oral communication skills;
- Demonstrated high level of initiative and leadership;
- Strong teamwork and collaboration capabilities;
- Excellent time management and task prioritization skills;
- Clear and demonstrated interest in consulting through coursework, work experience, activities, or attendance at CRA recruiting events.