ApplySOC Analyst - Tier 2
Posted about 1 month agoViewed
View full description
Requirements:
- 4 - 5 + years of relevant cybersecurity experience with strong knowledge of security operations.
- 4 - 5 + years of cybersecurity experience in at least two of the following: endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics.
- Strong knowledge of modern operating systems - Windows is a must, with OS X and Linux as advantages.
- Solid foundation in networking protocols and architectures.
- Experience with a scripting language (Python, Bash, PowerShell, etc.).
- Self-motivated and results-oriented; capable of leading and completing assignments without supervision.
- Strong organisational skills and ability to handle diverse tasks and re-prioritize.
- Motivation to improve processes and methodologies.
- Ability to work independently and collaboratively in a remote setting.
- Excellent interpersonal, verbal and written communication skills.
- Must have excellent Japanese and English reading, writing, and speaking skills.
Responsibilities:
- Being the point of escalation and performing security analysis of the most critical endpoint alerts (MDR).
- Applying expertise to piece together the attack chain across complex environments including cloud, identity, email, network, and endpoint (MXDR).
- Participating in various stages of incident investigations, responding to active breaches, and protecting customers.
- Threat hunting across customer environments searching for attackers or remnants of activity.
- Conducting analysis and research into new and emerging attacks, actors, malware samples, and TTPs.
- Collecting, processing, and exploiting OSINT for better hunting queries and contributing to Threat Alerts.
- Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives.
Apply