SOC Analyst Tier-1

Cybereason Logo

Cybereason

๐Ÿ“Remote - Japan

Summary

Join Cybereason's Global Security Operations team as a Security Analyst and play an integral role in providing MDR and MXDR services to large organizations worldwide. Collaborate with top experts in incident response, malware analysis, and security research. Work remotely in a 'follow the sun' global model with no night shifts. The role involves analyzing endpoint alerts, investigating attack chains, performing threat hunting, and engaging in customer interactions. Cybereason values its people and offers a diverse, inclusive workplace. This is an opportunity to grow professionally while working with a team of security experts in a leading company.

Requirements

  • 2+ years of relevant cybersecurity experience
  • General familiarity with Windows OS, networking protocols and architectures
  • Passion to develop practical cybersecurity skills and self-motivated learning habits
  • Motivation to constantly improve processes and methodologies
  • Self-motivated and results-oriented; capable of leading and completing assignments without supervision
  • Able both independently as well collaborate within a team in a remote work setting
  • Excellent interpersonal, verbal and written communication skills, ability to elucidate technical content to non-technical personnel
  • Able to work rotating weekend shifts (several times per month)
  • Must have Professional working Proficiency both in Japanese and English

Responsibilities

  • Performing security analysis of the most critical endpoint alerts (MDR)
  • Applying your expertise to piece together the attack chain across customers complex environments including cloud, identity, email, network, and endpoint (MXDR)
  • Performing security analysis of Mobile threat alerts (Managed MTD)
  • Deeply analyzing security incidents and reporting detailed TTPs and impacts of attacks
  • Threat hunting across customers environments searching for attackers or remnants of their activity
  • Analysis and research into new, emerging, or trending attacks, actors, malware samples and TTPs
  • Engaging in customer-facing interactions about the threat and our analysis via phone, email, and remote meeting
  • Working in teamwork with peers, senior analysts and managers to maintain a high level of analysis quality and improve client satisfaction

Preferred Qualifications

  • Bachelor's or Master's degree in Computer Science or related field
  • 2+ years of SOC experience as an analyst
  • Cybersecurity experience on Threat Hunting, Pentesting, Incident Response, Vulnerability testing, Malware analysis, Blue Team or CSIRT
  • General familiarity with malware and its techniques (e.g., code injection, fileless execution, maintaining persistence)
  • Familiarity with common operating system concepts (e.g. processes, threads, DLLs, parent-child process relationships, scheduled tasks)
  • Full Proficiency both in Japanese and English

Benefits

Remote work

Share this job:

Disclaimer: Please check that the job is real before you apply. Applying might take you to another website that we don't own. Please be aware that any actions taken during the application process are solely your responsibility, and we bear no responsibility for any outcomes.