Enable job alerts via email!

SOC Analyst Tier 1

JR United Kingdom

West Midlands Combined Authority

Remote

GBP 35,000 - 50,000

Full time

8 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

Une entreprise de cybersécurité mondialement reconnue recherche des personnes curieuses et techniques pour rejoindre son équipe d'opérations de sécurité. Ce rôle implique d'analyser et de remédier aux incidents de sécurité tout en collaborant avec des équipes variées et en interagissant avec des clients à différents niveaux. Une expertise en cybercriminalité et en analyse de malware est essentielle, tout comme une capacité à communiquer efficacement des contenus techniques à des personnes non techniques.

Qualifications

  • Expérience antérieure en environnement CIRT/SOC (1+ an est un avantage).
  • Familiarité avec l'analyse de malware et les techniques associées.
  • Connaissance des systèmes d'exploitation et des scripts.

Responsibilities

  • Analyser, trier et remédier aux incidents de sécurité (MDR).
  • Appliquer l'expertise pour reconstituer la chaîne d'attaque dans des environnements complexes.
  • Participer aux investigations d'incidents et répondre aux violations actives.

Skills

Malware analysis
Incident response
Threat hunting
Scripting languages
Networking protocols

Job description

Social network you want to login/join with:

At Cybereason, we empower organizations around the world to take an entirely new approach to cybersecurity. Regardless of your role here, you will play an integral part in helping to empower our customers to reverse the attackers’ advantage and end attacks from endpoint to everywhere. Our deep understanding and embodiment of our Core Values unites us as an organisation and empowers us to put our best foot forward. Each day we strive to win as one, be daring, evolve, and never, ever, give up as we work on our shared mission.

Throughout our global organisation, whether working from remote, hybrid or in an office, we foster a culture that embraces all people, empowering each of us to be us (#UbU).

If you’re looking to join an organisation deeply rooted in their values that empowers their employees to do their best work, whatever that work might be, come join our EMEA Organisation!

Cybereason is looking for curious, diligent, technical people to be a part of our Global Security Operations team. As a member of this elite team, you’ll take an integral role, providing Managed Detection and Response (MDR) and Managed Extended Detection and Response (MXDR) services to large organisations around the globe. You’ll be working closely with some of the best minds in incident response, malware analysis, and security research, partnering with our customers and partners to defend against the most advanced adversaries.

We value our people and empower them to work remotely. As we operate a ‘follow the sun’ global model we don’t ask our people to work unsociable hours.

What You'll Be Responsible For:

  • Analysing, triaging, and remediating security incidents (MDR)
  • Applying your expertise to piece together the attack chain across customers complex environments including cloud, identity, email, network, and endpoint (MXDR)
  • Participating in various stages of incident investigations including taking decisive steps to respond to active breaches and protect our customers
  • Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives
  • Working closely with internal company teams (such as Product, Customer Success, etc.)

What We Are Looking For:

  • Previous experience in a CIRT/SOC environment. 1+ years of experience is an advantage.
  • General familiarity with malware and its techniques (e.g., code injection, fileless execution, maintaining persistence)
  • Familiarity with static and behavioral malware analysis methods and tools (e.g., sandbox environments)
  • Background and experience in at least two of the following is an advantage:
  • Endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics
  • Familiarity with common operating system concepts (e.g., processes, threads, DLLs, parent-child process relationships, scheduled tasks)
  • Solid foundation in networking protocols and architectures
  • Experience with a scripting language (Python, Bash, PowerShell, etc.)
  • Self-motivated and results-oriented; capable of leading and completing assignments without supervision
  • Strong organisational skills and ability to handle a wide range of tasks and re-prioritize them on short notice
  • Motivation to constantly improve processes and methodologies
  • Able both independently as well collaborate within a team in a remote work setting
  • Excellent interpersonal, verbal and written communication skills, ability to elucidate technical content to non-technical personnel
  • Must have excellent English reading, writing, and speaking skills

Strong advantage to candidates with multiple EMEA languages

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.