Role Summary
As a Threat Analyst - Tier II on our Managed Detection and Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.
MDR)チームの
What You Will Do
Monitor, investigate, and respond to alerts generated by the Sophos security stack (including EDR / XDR capabilities)Lead and mentor Tier I Analysts through escalated cases, ensuring thorough and accurate investigation practices.Perform end-to-end analysis on suspicious activity to assess scope, impact, and riskIdentify and respond to cyber threats across customer environments using approved playbooks and toolingAccurately document findings, investigative steps, and outcomes in the MDR case management platformConduct threat hunting to identify potential threats throughout the MDR customer baseInvestigate phishing emails, suspicious binaries, and behavioral anomaliesSupport detection tuning by identifying recurring false positives and suggesting improvementsStay informed on threat actor behaviors, MITRE ATT&CK techniques, and Sophos threat research updatesProactively research emerging IOCs, active exploits, and vulnerabilities to stay ahead of evolving threatsContribute to internal knowledge bases, documentation, and continuous improvement initiativesParticipate in shift rotations and ensure timely, detailed handovers between global teamsProvide detection and response support for active security incidentsManage case workflows : create cases, track progress, and follow up with clients until resolutionEngage with clients via email, phone, and tickets as part of case handlingAssist with developing and refining Security Operations processes, playbooks, and tooling feedbackEDR / XDR 機能を含む)から生成されるアラートの監視、調査、対応Tier I アナリストを指導し、徹底的かつ正確な調査を実施する。MDR ケース管理プラットフォームにおいて、調査結果、調査手順、結果を正確に文書化するMDR の顧客ベース全体を通して潜在的な脅威を特定する脅威ハンティングを実施するMITRE ATT&CK テクニック、ソフォスの脅威リサーチアップデートに関する情報を常に入手IOC、アクティブなエクスプロイト、脆弱性を積極的に調査し、進化する脅威に先手を打つWhat You Will Bring
2+ years of hands-on experience in a Security Operations Center (SOC), Managed Detection and Response (MDR) environment, or cybersecurity-focused IT roleProficient in the use of endpoint and network security tools (, EDR, IDS / IPS, malware detection platforms) with the ability to validate and triage complex alertsWorking knowledge of Windows operating systems (both workstation and server), with additional experience in Linux (Ubuntu, Debian, RedHat) or macOS environmentsAbility to interpret and analyze Windows event logs and other telemetry dataUnderstanding of core network concepts including TCP / IP, protocols, routing, and traffic analysisDemonstrated experience contributing to real-time incident response efforts and threat investigationsExposure to threat hunting methodologies and an understanding of attacker behavior and patternsExperience handling active threats, including containment, mitigation, and recovery efforts during security incidentsFamiliar with techniques such as persistence, privilege escalation, lateral movement, and defense evasion, and able to identify these in real-world environmentsFamiliarity with common incident response workflows and security operations processesStrong analytical thinking and troubleshooting skills, with attention to detail in investigations and case documentationExcellent communication skills, with the ability to clearly explain findings to both technical and non-technical audiencesCustomer-first mindset with professionalism and a focus on service excellenceMust thrive within a team environment as well as on an individual basisNatural curiosity and willingness to learn in a fast-paced, ever-changing threat landscapeA passion for cybersecurity, continuous improvement, and staying current on threat trendsBachelor’s degree in Information Technology, Computer Science, Cybersecurity or related field, or equivalent practical experienceWillingness to work from 0630 to 1500 JST, with the flexbility to adjust to business requirements.Willingness to participate in rotating weekend and holiday coverage (our MDR service is 24x7x365)SOC)、マネージド・ディテクション・アンド・レスポンス(MDR)環境、またはサイバーセキュリティに特化した IT 部門における 2 年以上の実務経験EDR、IDS / IPS、マルウェア検出プラットフォーム)の使用に習熟しており、複雑なアラートを検証し、トリアージする能力を有することWindows オペレーティングシステム(ワークステーションとサーバーの両方)の実務知識があり、Linux(Ubuntu、Debian、RedHat)または macOS 環境での経験もあることWindows イベントログおよびその他の遠隔測定データを解釈し、分析する能力を有することTCP / IP、プロトコル、ルーティング、トラフィック分析を含むコアネットワークの概念を理解していること。0630-1500の勤務が可能で、ビジネス要件に柔軟に対応できること。MDRサービスは24時間365日体制です。)LI-FC1#B1#LI-Remote Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply. What's Great About Sophos?
Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information.Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spiritEmployee-led diversity and inclusion networks that build community and provide education and advocacyAnnual charity and fundraising initiatives and volunteer days for employees to support local communitiesGlobal employee sustainability initiatives to reduce our environmental footprintGlobal fitness and trivia competitions to keep our bodies and minds sharpGlobal wellbeing days for employees to relax and rechargeMonthly wellbeing webinars and training to support employee health and wellbeing