Apply

SOC Analyst - Tier 2

Posted about 1 month agoViewed

View full description

💎 Seniority level: Middle, 4 - 5 + years

📍 Location: Japan

🔍 Industry: Cybersecurity

🏢 Company: Cybereason👥 1001-5000💰 $100,000,000 Series G almost 2 years ago🫂 Last layoff 12 months agoReal TimeCyber SecurityEnterprise SoftwareNetwork SecurityIntrusion Detection

🗣️ Languages: Japanese, English

⏳ Experience: 4 - 5 + years

🪄 Skills: PythonBashLinuxNetworking

Requirements:
  • 4 - 5 + years of relevant cybersecurity experience with strong knowledge of security operations.
  • 4 - 5 + years of cybersecurity experience in at least two of the following: endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics.
  • Strong knowledge of modern operating systems - Windows is a must, with OS X and Linux as advantages.
  • Solid foundation in networking protocols and architectures.
  • Experience with a scripting language (Python, Bash, PowerShell, etc.).
  • Self-motivated and results-oriented; capable of leading and completing assignments without supervision.
  • Strong organisational skills and ability to handle diverse tasks and re-prioritize.
  • Motivation to improve processes and methodologies.
  • Ability to work independently and collaboratively in a remote setting.
  • Excellent interpersonal, verbal and written communication skills.
  • Must have excellent Japanese and English reading, writing, and speaking skills.
Responsibilities:
  • Being the point of escalation and performing security analysis of the most critical endpoint alerts (MDR).
  • Applying expertise to piece together the attack chain across complex environments including cloud, identity, email, network, and endpoint (MXDR).
  • Participating in various stages of incident investigations, responding to active breaches, and protecting customers.
  • Threat hunting across customer environments searching for attackers or remnants of activity.
  • Conducting analysis and research into new and emerging attacks, actors, malware samples, and TTPs.
  • Collecting, processing, and exploiting OSINT for better hunting queries and contributing to Threat Alerts.
  • Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives.
Apply