Leads engage in comprehensive investigations and provide actionable guidance on sophisticated security threats, ensuring integration of the latest intelligence for effective incident response.
Lead assigned engagements to investigate, contain and respond to customers’ cyber incidents, helping them through difficult and stressful times, which may involve non-traditional working hours.
Perform incident response investigations, containment and root cause analysis activities across multiple platforms including Windows, Mac, Linux/Unix platforms.
Utilise Sophos tools to conduct large-scale investigations and examine endpoint and network-based evidence
Own the customer engagement including leading communications with the customer’s senior stakeholders
Liaise with other internal teams to set priorities as part of the incident response.
Effectively report on the status and any points of concern within customer engagements to senior management within Sophos.
Produce high-quality written and verbal communications, recommendations, and findings to customer stakeholders.
Recognise and codify attacker TTPs to enhance current and future investigations and tooling.
Work with SophosLabs, security and IT teams to implement remediation plans in response to security incidents.
Maintain awareness of current cyber security tools and threat landscape in order to advise customers appropriately.
Serve as the primary liaison with internal threat intelligence teams, integrating timely intelligence on attacker tactics, techniques, and infrastructure into investigations and client deliverables to strengthen response strategies.
Translate complex threat intelligence into clear, actionable insights for clients, presenting trends, adversary behaviours, and likely attack scenarios in a way that supports decision‑making and improves clients’ overall security posture.
Proficiency in the Japanese language.
Open to work outside of standard business hours including weekends, on call rotations and holidays to respond to our clients incidents.
5+ years of experience leading incident response investigations in a methodical manner for organisations and investigating targeted threats impacting customer environments
Experience with Encase, FTK, X-Ways, CYLR, Autopsy, Magnet Forensics or one or more open-source forensic tool(s).
Experience conducting forensics in Microsoft 365 environments.
Deep understanding of security threats, vulnerabilities and ‘Living off the Land’ techniques.
Able to thrive within a team environment as well as on an individual basis.
Demonstrate strong leadership in challenging environments, maintaining a professional, calm, and expert manner at all times.
Ability to use individual team members’ strengths and skills to successfully lead an incident response.
Good technical understanding of modern threats, TTPs, and the MITRE ATT&CK Matrix.
Strong report-writing and communication skills.
Desirable
Fluent in English language.
Experience with Sophos security solutions and other recognised EDR solutions.
Experience conducting forensics in AWS environments.
Experience of supporting organisations of different sizes and geographical locations, across industries.
Threat hunting experience.
Experience administering and supporting Windows, Mac and Linux based operating systems
Understanding of OSQuery (or SQL).
At least one certification in GCIH, GCFA, GCFE. Advanced Information Security certifications preferred but not required.
Resolution of security incidents by identifying root cause and security posture improvement recommendations.
Demonstrated thought leadership through industry presentations, blogs, media articles, etc.
Sophos builds advanced security solutions designed to protect against cyberattacks, delivering comprehensive services like Managed Detection and Response (MDR) and endpoint, network, and email security. Targeting organizations across the globe, Sophos serves over 600,000 clients, utilizing the expertise of their combined technologies following the acquisition of Secureworks. Their unique offerings interoperate through the Sophos Central platform, fortified by real-time threat intelligence from their dedicated threat teams.
Please mention you found this job on AI Jobs. It helps us get more startups to hire on our site. Thanks and good luck!