Role Summary
As a Threat Analyst on our Managed Threat Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats. Shift: 8-5pm ET
\n
What You Will Do
Investigate and analyze logs and security-related events via Sophos tooling
Identify and respond to cyber threats occurring within customer environments
Communicate and document findings to various customer audiences including technical and executive teams
Follow up with customers through to issue resolution and drive continuous improvement by providing detailed recommendations to minimize risk in customer environments
Acknowledge and satisfy inbound customer requests and interact with customers through various mediums
Collaborate and assist with core security and threat response teams
Actively research emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our customers
What You Will Bring
Willingness to work outside of standard business hours, including weekends and holidays – our MDR service is 24x7x365
Excellent troubleshooting and analytical skills, with proven ability to think outside the box
Customer service-oriented with strong written and verbal communication skills
Must thrive within a team environment as well as on an individual basis
Passion for all things related to information technology and cybersecurity
Natural curiosity and ability to learn new skills quickly
Innovative mindset and driven to contribute to a team providing a best-in-class cybersecurity service
Minimum 2+ years of experience working in a SOC environment or computer security team in an IT environment
Experience with threat hunting
Experience with endpoint and network security monitoring
Experience administering and supporting Windows OS (both workstations and server) and one of the following: Apple or Linux-based operating systems (e.g. XP, Windows 7, 2003, 2008, OS X)
Knowledge of common adversary tactics and techniques, e.g., obfuscation, persistence, defense evasion, etc.
Knowledge of Mitre ATT&CK framework
Knowledge of incident response procedures
Basic understanding of network traffic analysis including TCP/IP, routing, switching, protocols, etc.
Basic understanding of Windows event log analysis
A plus if you have:
Experience with SQL query construction
Experience with OSQuery
Experience with enterprise information security data management - SIEM experience
Programming and scripting skills - proficient knowledge of Powershell
\n
In the Canada, the base salary for this role ranges from $56,000 to $93,000. In addition to base salary, we offer additional compensation including bonus eligibility and a comprehensive benefits package. A candidate’s specific pay within this range will depend on a variety of factors, including job-related skills, training, location, experience, relevant education, certifications, and other business and organizational needs.
B1
LI-ND1
LI-Remote