Security Detection and Response Analyst - Tier 1

Cybereason
Summary
Join Cybereason's Global Security Operations team as a curious and diligent technical expert, providing Managed Detection and Response (MDR) and Managed Extended Detection and Response (MXDR) services to large organizations worldwide. You will work with top minds in incident response and security research, partnering with customers and partners to combat advanced adversaries. This role involves analyzing and remediating security incidents, investigating attacks across complex environments, and engaging in customer-facing interactions. Cybereason values its people and empowers remote work, operating on a global model to avoid unsociable hours. The company fosters a culture that embraces all people and is deeply rooted in its core values. If you are excited about this role and Cybereason's mission, apply today!
Requirements
- Previous experience in a CIRT/SOC environment. 1+ years of experience is an advantage
- General familiarity with malware and its techniques (e.g., code injection, fileless execution, maintaining persistence)
- Familiarity with static and behavioural malware analysis methods and tools (e.g., sandbox environments)
- Familiarity with common operating system concepts (e.g., processes, threads, DLLs, parent-child process relationships, scheduled tasks)
- Solid foundation in networking protocols and architectures
- Experience with a scripting language (Python, Bash, PowerShell, etc.)
- Self-motivated and results-oriented; capable of leading and completing assignments without supervision
- Strong organisational skills and ability to handle a wide range of tasks and re-prioritize them on short notice
- Motivation to constantly improve processes and methodologies
- Able both independently as well collaborate within a team in a remote work setting
- Excellent interpersonal, verbal and written communication skills, ability to elucidate technical content to non-technical personnel
- Must have excellent English reading, writing, and speaking skills
Responsibilities
- Analysing, triaging, and remediating security incidents (MDR)
- Applying your expertise to piece together the attack chain across customers complex environments including cloud, identity, email, network, and endpoint (MXDR)
- Participating in various stages of incident investigations including taking decisive steps to respond to active breaches and protect our customers
- Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives
- Working closely with internal company teams (such as Product, Customer Success, etc.)
Preferred Qualifications
- Background and experience in at least two of the following is an advantage: Endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics
- Strong advantage to candidates with multiple EMEA languages
Benefits
- We value our people and empower them to work remotely
- As we operate a βfollow the sunβ global model we donβt ask our people to work unsociable hours