Threat Analyst 1

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Bachelor’s degree in Information Technology, Computer Science, Cybersecurity or related field, or equivalent practical experience., 1+ years of experience in a Security Operations Center (SOC) or cybersecurity-focused IT role., Familiarity with endpoint and network security tools, including EDR, IDS/IPS, and malware prevention solutions., Strong analytical thinking and troubleshooting skills, with excellent communication abilities..

Key responsibilities:

  • Monitor, investigate, and respond to alerts generated by the Sophos security stack.
  • Perform end-to-end analysis on suspicious activity to assess scope, impact, and risk.
  • Conduct threat hunting to identify potential threats and support detection tuning.
  • Engage with clients via email, phone, and tickets as part of case handling.

Sophos logo
Sophos Large https://www.sophos.com/
1001 - 5000 Employees
See all jobs

Job description

About Us
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.

Role Summary
As a Threat Analyst - Tier I on our Managed Detection and Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.

What You Will Do
  • Monitor, investigate, and respond to alerts generated by the Sophos security stack (including EDR/XDR capabilities)
  • Perform end-to-end analysis on suspicious activity to assess scope, impact, and risk
  • Identify and respond to cyber threats across customer environments using approved playbooks and tooling
  • Accurately document findings, investigative steps, and outcomes in the MDR case management platform
  • Conduct threat hunting to identify potential threats throughout the MDR customer base
  • Investigate phishing emails, suspicious binaries, and behavioral anomalies
  • Support detection tuning by identifying recurring false positives and suggesting improvements
  • Stay informed on threat actor behaviors, MITRE ATT&CK techniques, and Sophos threat research updates
  • Proactively research emerging IOCs, active exploits, and vulnerabilities to stay ahead of evolving threats
  • Contribute to internal knowledge bases, documentation, and continuous improvement initiatives
  • Participate in shift rotations and ensure timely, detailed handovers between global teams
  • Provide detection and response support for active security incidents
  • Manage case workflows: create cases, track progress, and follow up with clients until resolution
  • Engage with clients via email, phone, and tickets as part of case handling
  • Assist with developing and refining Security Operations processes, playbooks, and tooling feedback

  • What You Will Bring
  • 1+ years of experience working in a Security Operations Center (SOC) or cybersecurity-focused IT role
  • Familiarity with endpoint and network security tools, including EDR, IDS/IPS, and malware prevention/monitoring solutions
  • Working knowledge of Windows operating systems (both workstation and server), with additional experience in Linux (Ubuntu, Debian, RedHat) or macOS environments
  • Ability to interpret and analyze Windows event logs and other telemetry data
  • Understanding of core network concepts including TCP/IP, protocols, routing, and traffic analysis
  • Practical experience investigating alerts and performing basic response actions in a real-time environment
  • Exposure to threat hunting methodologies and an understanding of attacker behavior and patterns
  • Exposure to incidents involving active threats and taking active response measures to contain the threat.
  • Foundational understanding of adversary tactics and techniques (e.g., persistence, privilege escalation, lateral movement, obfuscation), especially as defined in frameworks like MITRE ATT&CK
  • Familiarity with common incident response workflows and security operations processes
  • Strong analytical thinking and troubleshooting skills, with attention to detail in investigations and case documentation
  • Excellent communication skills, with the ability to clearly explain findings to both technical and non-technical audiences
  • Customer-first mindset with professionalism and a focus on service excellence
  • Must thrive within a team environment as well as on an individual basis
  • Natural curiosity and willingness to learn in a fast-paced, ever-changing threat landscape
  • A passion for cybersecurity, continuous improvement, and staying current on threat trends
  • Bachelor’s degree in Information Technology, Computer Science, Cybersecurity or related field, or equivalent practical experience
  • Willingness to participate in rotating weekend and holiday coverage (our MDR service is 24x7x365)

  • Desirable
  • Familiarity with the MITRE ATT&CK framework and its application in detection and response
  • Experience working with SIEM platforms and managing enterprise security telemetry
  • Ability to write and interpret SQL queries for data analysis and investigation
  • Experience with OSQuery and scripting skills, particularly in PowerShell
  • Relevant and practical cybersecurity certifications (e.g., GSEC, GCIA, GCIH, PEN-200, Security Blue Team L1, TCM Academy SOC L1, or similar)
  • #LI-FC1
    #B1
    #LI-Remote

    Ready to Join Us?
    At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply.

    What's Great About Sophos?
    ·   Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information.
    ·   Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit
    ·   Employee-led diversity and inclusion networks that build community and provide education and advocacy
    ·   Annual charity and fundraising initiatives and volunteer days for employees to support local communities
    ·   Global employee sustainability initiatives to reduce our environmental footprint
    ·   Global fitness and trivia competitions to keep our bodies and minds sharp
    ·   Global wellbeing days for employees to relax and recharge 
    ·   Monthly wellbeing webinars and training to support employee health and wellbeing

    Our Commitment To You
    We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity.   We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team.  All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation.  We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. 

    Data Protection
    If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos.  If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights.  For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos

    Required profile

    Experience

    Spoken language(s):
    English
    Check out the description to know which languages are mandatory.

    Other Skills

    • Communication
    • Adaptability
    • Teamwork
    • Customer Service
    • Analytical Thinking
    • Curiosity
    • Troubleshooting (Problem Solving)

    Cyber Threat Intelligence Analyst Related jobs