3+ years of experience in Incident Response or a related role, Post-secondary education in Cybersecurity or comparable, Strong understanding of Windows logs and forensic artifacts, Cybersecurity certifications (e.g. CompTIA CySA+, GCFE, GCIH) are a plus..
Key responsibilities:
Perform in-depth forensic analysis of systems and investigate customer networks for suspicious activity
Lead assigned incident response engagements and delegate tasks to other consultants
Document and communicate findings to customers, maintaining detailed documentation
Conduct searches through OSINT sources and log work hours accurately for each engagement.
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Sophos is a worldwide leader and innovator of advanced cybersecurity solutions, including Managed Detection and Response (MDR) and incident response services and a broad portfolio of endpoint, network, email, and cloud security technologies that help organizations defeat cyberattacks.
As one of the largest pure-play cybersecurity providers, Sophos defends more than 500,000 organizations and more than 100 million users globally from active adversaries, ransomware, phishing, malware, and more.
Sophos’ services and products connect through its cloud-based Sophos Central management console and are powered by Sophos X-Ops, the company’s cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the entire Sophos Adaptive Cybersecurity Ecosystem, which includes a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity and information technology vendors.
Sophos provides cybersecurity-as-a-service to organizations needing fully-managed, turnkey security solutions. Customers can also manage their cybersecurity directly with Sophos’ security operations platform or use a hybrid approach by supplementing their in-house teams with Sophos’ services, including threat hunting and remediation.
Sophos sells through reseller partners and managed service providers (MSPs) worldwide.
Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com
Sophos is seeking an experienced and motivated Incident Response Consultant 3 to join our Incident Response (IR) service. The Sophos IR team is an elite group of incident responders that are engaged by organizations worldwide to respond to and neutralize cyber threats. Specializing in industry-standard forensic tools and Sophos technologies, the team provides comprehensive investigations, response actions, remediation guidance, and root cause analysis to combat a wide range of cybersecurity incidents.
As an Incident Response Consultant 3 on the Sophos IR team, you will collaborate with a dedicated group of experts to neutralize critical security incidents for customers of varying sizes and industries. In this role, you will be responsible for investigating at-scale across the customer networks and conducting forensic analysis using industry standard tools to identify indicators of compromise and tactics, techniques, and procedures used by threat actors. Reporting to the Team Lead, Incident Response, you will, lead assigned incident response engagements, delegate tasks to other assigned consultants, and will be responsible for documenting and communicating findings to our customers.
What You Will Do
Perform in-depth forensic analysis of systems
Acquire full disk and triage images of Windows, Mac, and Linux systems for investigation
Investigate customer networks for suspicious and malicious activity
Leverage tools such as XDR to perform large-scale threat hunts
Identify systems of interest related to ongoing investigations
Maintain detailed and accurate documentation, including meeting notes and investigative findings
Document IOCs and contribute to the development of threat intelligence
Collect sample files from customer devices as part of incident investigations
Conduct searches through OSINT sources
Log work hours accurately for each customer engagement
Complete assigned training and development programs as directed by the Team Lead
What You Will Bring
3+ years of experience in Incident Response or a related role
Excellent understanding of Windows logs and forensic artifacts
Strong understanding of hypervisors and virtualization
Experience in conducting full disk and triage image acquisition
Working knowledge of mapping adversary behavior to the MITRE ATT&CK framework
Demonstrated experience working with common open-source forensic utilities
Passion for cyber security, incident response, and digital forensics
A desire for continuous learning
Strong written communication skills
A team-player attitude with a willingness to share knowledge
Ability to work some weekends and holidays
Experience leading BEC investigations
Post-secondary education in Cybersecurity, or comparable
Cybersecurity certifications is a plus (e.g. CompTIA CySA+, GCFE, GCIH, or similar)
Experience with SIEM technology is a plus (e.g. Splunk, ELK, etc.)
Willingness to work occasional overtime during peak times or holidays
Experience writing SQL queries is a plus
Experience writing PowerShell, Python, or Bash scripts is a plus
In the United States, the base salary for this role ranges from $135,000 to $225,000. In addition to base salary, we offer additional compensation including bonus eligibility and a comprehensive benefits package. A candidate’s specific pay within this range will depend on a variety of factors, including job-related skills, training, location, experience, relevant education, certifications, and other business and organizational needs.
#li-remote
#B2
#Li-JA1
Required profile
Experience
Spoken language(s):
English
Check out the description to know which languages are mandatory.