Soc Analyst - Tier 2

Cybereason Logo

Cybereason

πŸ“Remote - Japan

Summary

Join Cybereason's Global Security Operations team as a Security Analyst and provide Managed Detection and Response (MDR) and Managed Extended Detection and Response (MXDR) services to large organizations worldwide. You will work with a diverse team, performing critical security analysis, incident investigations, threat hunting, and research on emerging attacks. This role involves collaborating with customers and partners to defend against advanced adversaries. Cybereason values its people and empowers remote work with a global 'follow the sun' model to avoid unsociable hours. The position is based in Tokyo, and requires excellent Japanese and English communication skills.

Requirements

  • Have 4 - 5+ years of relevant cybersecurity experience with a strong knowledge working in security operations
  • Have 4 - 5+ years of relevant cybersecurity experience in at least two of the following: Endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics
  • Have strong knowledge of modern operating systems Windows
  • Have a solid foundation in networking protocols and architectures
  • Have experience with a scripting language (Python, Bash, PowerShell, etc.)
  • Be self-motivated and results-oriented; capable of leading and completing assignments without supervision
  • Have strong organizational skills and the ability to handle a wide range of tasks and re-prioritize them on short notice
  • Have motivation to constantly improve processes and methodologies
  • Be able to work both independently and collaborate within a team in a remote work setting
  • Have excellent interpersonal, verbal and written communication skills, and the ability to elucidate technical content to non-technical personnel
  • Have excellent Japanese and English reading, writing, and speaking skills

Responsibilities

  • Be the point of escalation and perform security analysis of the most critical endpoint alerts (MDR)
  • Apply your expertise to piece together the attack chain across customers' complex environments including cloud, identity, email, network, and endpoint (MXDR)
  • Participate in various stages of incident investigations including taking decisive steps to respond to active breaches and protect our customers
  • Threat hunt across customers' environments searching for attackers or remnants of their activity
  • Analyze and research into new, emerging, or trending attacks, actors, malware samples and TTPs
  • Collect, process, and exploit OSINT to facilitate the creation of better hunting queries and contribute to the creation of Threat Alerts
  • Engage in customer-facing interactions at all levels from SOC analysts to c-suite executives

Preferred Qualifications

Have OS X and Linux experience

Benefits

  • Work remotely
  • Operate on a β€˜follow the sun’ global model, avoiding unsociable hours

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.