Skip to Main Content

Job Title


Forensic Investigator


Company : Docusign


Location : Sydney, Australia


Created : 2026-02-02


Job Type : Full Time


Job Description

Company OverviewDocusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people''s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign''s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).What you''ll doWe are looking for a highly motivated and skilled forensic investigator to join our dynamic security team in Australia. Reporting to the CSIRT Manager, this individual contributor role is essential to the "Detect & Respond" function through in-depth digital forensic analysis and evidence preservation. You will identify root causes, support threat containment, and perform comprehensive threat hunting activities to bolster our security posture. The position requires strong technical expertise in forensic tools and the ability to communicate findings clearly to both technical and operational teams. Finally, the ideal candidate must be proactive, participate in an on-call rotation, and maintain a readiness to respond to urgent security events.This position is an individual contributor role reporting to the Manager of CSIRT.ResponsibilityLead and participate in the investigation, coordination, and resolution of security incidentsPerform comprehensive digital forensic analysis of end-user systems, servers, cloud environments, network devices, and other digital artifacts to identify indicators of compromise (IOCs) and malicious activityAnalyze artifacts to trace user activity (e.g., file manipulation, USB activity, browser history, chat analysis, cloud activity)Identify security incidents through proactive "Hunting" operations within SIEM, EDR, and other relevant security toolsCollect, pre-process, capture, and preserve images and other forensic data artifacts, ensuring forensic soundness and integritySupport and coordinate remediation efforts following security incidentsResolve security incidents by identifying root causes and implementing solutionsProcess massive datasets using specialized forensic software (e.g., FTK, EnCase, Autopsy, Magnet Forensics Axiom, Cellebrite UFED4PC, Physical Analyzer, Endpoint Inspector) to filter, de-duplicate, and prepare data for analysisPerform data extraction and conversion for analysis in various forensic environmentsMaintain data and documentation according to prescribed chain of custody protocols, ensuring the integrity of forensic evidence for internal analysis and potential external reportingRegularly provide reporting and metrics on case work to the CSIRT leadershipDevelop, maintain, and enforce standard operating procedures (SOPs) for security incident response and digital forensic processesResearch new techniques and tools to improve forensic capabilities and incident response efficiencyCreate requirements and work with stakeholders to design, implement, and deploy security tools to enhance forensic and incident response capabilitiesPotentially build and maintain robust data pipelines to automate and orchestrate forensic data ingestion and processing within the security ecosystemCommunicate technical processes and findings clearly and precisely to CSIRT members, security leadership, and other relevant internal stakeholders, including writing fact-based reports on forensic data analysisInterface and connect with system owners, IT contacts, and other internal teams to pursue security incident response activities, including obtaining system access, digital artifact collection, and containment/remediation actionsProvide consultation and assessment on perceived security threatsEstablish consultative relationships with internal stakeholders, guiding them toward best practices in data and evidence handling for security investigationsJob DesignationHybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation)Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position''s job designation depending on business needs and as permitted by local law.What you bringBasic3+ years of hands-on experience in cybersecurity, with a focus on incident response and computer forensics analysisSolid understanding of cybersecurity principles, incident response lifecycles, and security best practicesExtensive experience with forensic tool suites such as Sumuri, Magnet Forensics Axiom, Velociraptor, and X-waysDeep expertise in digital evidence handling and forensic analysis across various operating systems (Windows, Unix/Linux) and environments (endpoint, server, cloud)Experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) for alert analysis and log correlationExperience with EDR and SIEM technologies (i.e., Splunk) for threat hunting and incident identificationProficiency in programming languages such as Python for scripting, automating forensic tasks, and potentially building data pipelines for security dataKnowledge of how to protect against AI threatsAbility to be on-call for global incident response as requiredPreferredExperience with big data frameworks like Apache Spark and Kafka for processing and streaming large volumes of security-related dataProgramming skills in PowerShell and/or C/C++Bachelor''s degree in Computer Science, Information Security, or a related fieldTraining and/or certifications from industry organizations or vendors (i.e., GCFE, GCFA, GREM, GCIH, EnCE, CISSP)Hands-on experience with SOAR platformsStrong analytical and problem-solving skills, with a keen eye for detail.Exceptional ability to communicate technical information clearly and precisely to technical and non-technical audiencesAbility to manage multiple complex investigations simultaneously with attention to detail and accuracyLife at DocusignWorking hereDocusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what''s right, every day. At Docusign, everything is equal.We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you''ll be loved by us, our customers, and the world in which we live.AccommodationDocusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at for assistance.Applicant and Candidate Privacy Notice #LI-Hybrid #LI-LR1