Role Summary
As a Threat Analyst 1 on our Managed Threat Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats. Shift:8-5pm ET
What You Will Do Investigate and analyze logs and security-related events via Sophos toolingIdentify and respond to cyber threats occurring within customer environmentsCommunicate and document findings to various customer audiences including technical and executive teamsFollow up with customers through to issue resolution and drive continuous improvement by providing detailed recommendations to minimize risk in customer environmentsAcknowledge and satisfy inbound customer requests and interact with customers through various mediumsCollaborate and assist with core security and threat response teamsActively research emerging Indicators of Compromise/Attack, exploits and vulnerabilities with the intent of operationalizing findings to better protect our customers What You Will Bring Willingness to work outside of standard business hours, including weekends and holidays – our MDR service is 24x7x365Excellent troubleshooting and analytical skills, with proven ability to think outside the boxCustomer service-oriented with strong written and verbal communication skillsMust thrive within a team environment as well as on an individual basisPassion for all things related to information technology and cybersecurityNatural curiosity and ability to learn new skills quicklyInnovative mindset and driven to contribute to a team providing a best-in-class cybersecurity serviceMinimum 2+ years of experience working in a SOC environment or computer security team in an IT environmentExperience with threat huntingExperience with endpoint and network security monitoringExperience administering and supporting Windows OS (both workstations and server) and one of the following: Apple or Linux-based operating systems (e.g. XP, Windows 7, 2003, 2008, OS X)Knowledge of common adversary tactics and techniques, e.g., obfuscation, persistence, defense evasion, etc.Knowledge of Mitre ATT&CK frameworkKnowledge of incident response proceduresBasic understanding of network traffic analysis including TCP/IP, routing, switching, protocols, etc.Basic understanding of Windows event log analysisA plus if you have:Experience with SQL query constructionExperience with OSQueryExperience with enterprise information security data management - SIEM experienceProgramming and scripting skills - proficient knowledge of Powershell Additional Information In the Canada, the base salary for this role ranges from $56,000 to $93,000. In addition to base salary, we offer additional compensation including bonus eligibility and a comprehensive benefits package. A candidate’s specific pay within this range will depend on a variety of factors, including job-related skills, training, location, experience, relevant education, certifications, and other business and organizational needs.
#B1
#LI-ND1
#LI-Remote