S
Senior Threat Analyst 1
Sophos
7d ago
0OtherRomaniahimalayas
Managed-Detection-and-Response-(MDR)Security-OperationsThreat-AnalysisIncident-ResponseCybersecuritySenior
Job Description
About UsSophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.Role SummaryAs a Senior Threat Analyst – Tier I on our Managed Detection and Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.What You Will DoMonitor, investigate, and respond to alerts generated by the Sophos security stack (including EDR/XDR capabilities)Lead and mentor Tier I Analysts through escalated cases, ensuring thorough and accurate investigation practices. Perform end-to-end analysis on suspicious activity to assess scope, impact, and riskIdentify and respond to cyber threats across customer environments using approved playbooks and toolingAccurately document findings, investigative steps, and outcomes in the MDR case management platformConduct threat hunting to identify potential threats throughout the MDR customer baseInvestigate phishing emails, suspicious binaries, and behavioral anomaliesSupport detection tuning by identifying recurring false positives and suggesting improvementsStay informed on threat actor behaviors, MITRE ATT&CK techniques, and Sophos threat research updatesProactively research emerging IOCs, active exploits, and vulnerabilities to stay ahead of evolving threatsContribute to internal knowledge bases, documentation, and continuous improvement initiativesParticipate in shift rotations and ensure timely, detailed handovers between global teamsProvide detection and response support for active security incidentsManage case workflows: create cases, track progress, and follow up with clients until resolutionEngage with clients via chat, phone, and tickets as part of case handlingAssist with developing and refining Security Operations processes, playbooks, and tooling feedbackWhat You Will Bring Essential3+ years of hands-on experience in a Security Operations Center (SOC), Managed Detection and Response (MDR) environment, or cybersecurity-focused IT roleProficient in the use of endpoint and network security tools (e.g., EDR, IDS/IPS, malware detection platforms) with the ability to validate and triage complex alertsWorking knowledge of Windows operating systems (both workstation and server), with additional experience in Linux (Ubuntu, Debian, RedHat) or macOS environmentsAbility to interpret and analyze Windows event logs and other telemetry dataUnderstanding of core network concepts including TCP/IP, protocols, routing, and traffic analysisDemonstrated experience contributing to real-time incident response efforts and threat investigationsExposure to threat hunting methodologies and an understanding of attacker behavior and patternsExperience handling active threats, including containment, mitigation, and recovery efforts during security incidentsFamiliar with techniques such as persistence, privilege escalation, lateral movement, and defense evasion, and able to identify these in real-world environmentsFamiliarity with common incident response workflows and security operations processesStrong analytical thinking and troubleshooting skills, with attention to detail in investigations and case documentationExcellent communication skills, with the ability to clearly explain findings to both technical and non-technical audiencesCustomer-first mindset with professionalism and a focus on service excellenceMust thrive within a team environment as
