Job Specifications
If your background is in Cybersecurity, Computer Science and Engineering, Digital Forensics, Management Information Systems, or Security Information Systems, learn more about internships at Charles River Associates!
About Charles River Associates
Charles River Associates is a leading global consulting firm that provides economic, financial, and business management expertise to major law firms, corporations and governments around the world. CRA advises clients on economic and financial matters pertaining to litigation and regulatory proceedings, and guides corporations through critical business strategy and performance-related issues. Since 1965, clients have engaged CRA for its combination of industry experience and rigorous, fact-based analysis that provide clients with clear, implementable solutions to complex business concerns.
Practices seeking to hire interns with this profile include (hiring locations listed):
Forensic Services/Cybersecurity & Digital Forensics (Boston, Chicago, Dallas, New York, Washington DC)
Our team supports cyber due diligence, incident response, insurance claims, and security transformation.
Forensic Services/E-Discovery (Boston, Chicago, New York)
Our team assists companies and their counsel in data preservation, collection, analysis, reporting, and delivery from cloud-based and other repositories.
Learn more about our work by reviewing our Services and Industries on our website.
Position Overview
Our Summer Analyst/Associate Internship program mirrors the analyst experience to give you an understanding of our business and experience project work at Charles River Associates. Throughout the 8-10 week program, Analyst/Associate Interns work alongside senior colleagues to deliver live client consulting projects within the practice area. Along the way, you’ll benefit from professional development and wellness support programs, social events to connect you with peers and a collegial work environment. Successful interns will be offered a full-time position following graduation.
During the Cyber and Forensic Technology Analyst/Associate Internship program, you may work on many aspects of a project:
Assist with security and privacy investigations in response to data security matters, which may include ongoing breaches and fraud;
Engage in problem solving and forensic analysis of digital information using standard computer forensic and evidence handling techniques and tools;
Apply investigative techniques, scientific reasoning, and digital forensic techniques against various systems to answer questions;
Identify, research, and organize information to determine what a hacker did to a compromised system, whether data was stolen from a company asset, or what data to assess and provide in a litigation;
Defensibly collect digital evidence and complete chain-of-custody documentation;
Leverage your programming, model building, and database administration skills (including using Python, T-SQL, VBA, Excel, C#, and/or other programming languages and tools);
Share investigative and analytical findings, and assist with the drafting of written reports to summarize procedures performed and findings;
Stay current with developments in digital forensics, e-discovery, and incident response.
Learn more about our work by reviewing our Services and Industries on our website.
Desired Qualifications
Bachelor’s or Master’s (non-MBA) degree candidates graduating December 2026/Summer 2027 with a related academic focus (Cybersecurity, Computer Science and Engineering, Digital Forensics, Management Information Systems, or Security Information Systems or related);
Familiarity with several core skills:
Strong understanding of computer operating systems, software, and hardware;
Ability to conduct detailed forensic investigations and analyses of computers, networks, mobile devices, and removable media;
Experience with conducting digital forensic analyses using commercial and open-source forensic tools, including file system forensics, memory analysis, and network analysis;
Experience with conducting static/dynamic malware analyses in a lab environment and threat hunting in a live environment;
Understanding of proper evidence handling procedures and chain-of-custody;
Experience with drafting technical and investigative reports and communicating technical findings;
Experience with utilizing automation tools and scripts to expedite analyses;
Understanding of incident handling procedures, including preparation, identification, containment, eradication and recovery-to-protect enterprise environments;
Understanding of common attack techniques used by an adversary on a victim network and how to leverage those techniques to stop further adversary activity;
Individuals with digital forensics/incident response training and/or certifications, including SANS GIAC (GCIA, GCFA, GCFE, GNFA, GCCC, and/or GREM), IACIS (CFCE or CIFR), and/or Guidance Software (EnCE), are preferred but not required.
Effective written and ora