What You Will Do
Maintain supervision over the daily queue and provide day-to-day oversight for threat analysts
Conduct regular one-on-one meetings with team members to provide coaching, mentorship, and support individual development plans that define clear performance goals
Carry out operational tasks with a focus on rapid resolution, improving efficiency, and reducing backlog
Oversee and coach analysts in providing accurate, timely technical context to customers, ensuring consistency, clarity, and adherence to MDR communication standards
Communicate findings and investigation details effectively to both technical and non-technical stakeholders
Collaborate with the wider MDR team to operationalize threat intelligence and produce Indicators of Compromise (IOCs) for future use
Provide triage, data collection, and overall support towards customer escalations
Champion continuous improvement efforts to refine incident response and threat detection methodologies
Escalate critical technical investigations to Senior Analysts and Senior Team Leads for review
Work within established frameworks that lead to success factors for the team
What You Will Bring
2-3+ years of experience within a cybersecurity environment as an analyst or similar role
Experience in a security operations center, or similar environment, and identifying indications of compromise or attack and responding to incidents
Endpoint and network security experience required; IDS, IPS, EDR, ATP, Malware defenses and monitoring experience
Willingness to work outside of standard business hours, including weekends and holidays – our MDR service is 24x7x365
Knowledge of common adversary tactics and techniques, e.g., obfuscation, persistence, defense evasion, etc.
Excellent communication and problem-solving abilities
Innovative mindset for adapting to changes and learning new skills quickly
Comfortable with shift-based work and cross-regional coordination