Sophos
Sophos1mo ago

Senior Threat Analyst 1

RomaniaRomaniaRemotePermanentsenior
SecurityOtherThreat Analyst
1 views0 saves0 applied

Quick Summary

Overview

About Us Sophos is a cybersecurity leader defending 600,000 organizations globally with an AI-driven platform and expert-led services.

Technical Tools
SecurityOtherThreat Analyst
About Us
Sophos is a cybersecurity leader defending 600,000 organizations globally with an AI-driven platform and expert-led services. Sophos meets organizations wherever they are in their security maturity and grows with them to defeat cyberattacks. Its solutions combine machine learning, automation, and real-time threat intelligence with frontline human expertise from Sophos X-Ops to deliver advanced, 24/7 threat monitoring, detection, and response.
 
Sophos offers industry-leading managed detection and response (MDR) alongside a comprehensive portfolio of cybersecurity technologies — including endpoint, network, email, and cloud security, extended detection and response (XDR), identity threat detection and response (ITDR), and next-gen SIEM. Together with expert advisory services, these capabilities help organizations proactively reduce risk and respond faster, with the visibility and scalability needed to stay ahead of evolving threats.
 
Sophos goes to market with a global partner ecosystem, including Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), resellers and distributors, marketplace integrations, and cyber risk partners, giving organizations the flexibility to choose trusted relationships when securing their business. Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.

 

As a Senior Threat Analyst – Tier I on our Managed Detection and Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.

  • Monitor, investigate, and respond to alerts generated by the Sophos security stack (including EDR/XDR capabilities)
  • Lead and mentor Tier I Analysts through escalated cases, ensuring thorough and accurate investigation practices.
  • Perform end-to-end analysis on suspicious activity to assess scope, impact, and risk
  • Identify and respond to cyber threats across customer environments using approved playbooks and tooling
  • Accurately document findings, investigative steps, and outcomes in the MDR case management platform
  • Conduct threat hunting to identify potential threats throughout the MDR customer base
  • Investigate phishing emails, suspicious binaries, and behavioral anomalies
  • Support detection tuning by identifying recurring false positives and suggesting improvements
  • Stay informed on threat actor behaviors, MITRE ATT&CK techniques, and Sophos threat research updates
  • Proactively research emerging IOCs, active exploits, and vulnerabilities to stay ahead of evolving threats
  • Contribute to internal knowledge bases, documentation, and continuous improvement initiatives
  • Participate in shift rotations and ensure timely, detailed handovers between global teams
  • Provide detection and response support for active security incidents
  • Manage case workflows: create cases, track progress, and follow up with clients until resolution
  • Engage with clients via chat, phone, and tickets as part of case handling
  • Assist with developing and refining Security Operations processes, playbooks, and tooling feedback

Essential

 

  • 3+ years of hands-on experience in a Security Operations Center (SOC), Managed Detection and Response (MDR) environment, or cybersecurity-focused IT role
  • Proficient in the use of endpoint and network security tools (e.g., EDR, IDS/IPS, malware detection platforms) with the ability to validate and triage complex alerts
  • Working knowledge of Windows operating systems (both workstation and server), with additional experience in Linux (Ubuntu, Debian, RedHat) or macOS environments
  • Ability to interpret and analyze Windows event logs and other telemetry data
  • Understanding of core network concepts including TCP/IP, protocols, routing, and traffic analysis
  • Demonstrated experience contributing to real-time incident response efforts and threat investigations
  • Exposure to threat hunting methodologies and an understanding of attacker behavior and patterns
  • Experience handling active threats, including containment, mitigation, and recovery efforts during security incidents
  • Familiar with techniques such as persistence, privilege escalation, lateral movement, and defense evasion, and able to identify these in real-world environments
  • Familiarity with common incident response workflows and security operations processes
  • Strong analytical thinking and troubleshooting skills, with attention to detail in investigations and case documentation
  • Excellent communication skills, with the ability to clearly explain findings to both technical and non-technical audiences
  • Customer-first mindset with professionalism and a focus on service excellence
  • Must thrive within a team environment as well as on an individual basis
  • Natural curiosity and willingness to learn in a fast-paced, ever-changing threat landscape
  • A passion for cybersecurity, continuous improvement, and staying current on threat trends
    • Bachelor's degree in information technology, Computer Science, Cybersecurity or related field, or equivalent practical experience
    • Ability to communicate in English
      • Willingness to participate in shift work including nights, weekends and holidays (our MDR service is 24x7x365)
      •  

        Desirable

         

        • Familiarity with the MITRE ATT&CK framework and its application in detection and response
        • Experience working with SIEM platforms and managing enterprise security telemetry
        • Ability to write and interpret SQL queries for data analysis and investigation
        • Experience with OSQuery and scripting skills, particularly in PowerShell
        • Relevant and practical cybersecurity certifications (e.g., GSEC, GCIA, GCIH, PEN-200, Security Blue Team L1, TCM Academy SOC L1, or similar)

Location & Eligibility

Where is the job
Romania
Remote within one country
Who can apply
RO
Listed under
Romania

Listing Details

Posted
March 25, 2026
First seen
April 9, 2026
Last seen
May 5, 2026

Posting Health

Days active
25
Repost count
0
Trust Level
32%
Scored at
May 5, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Sophos
Sophos
lever
Employees
3k+
Founded
2019
View company profile
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

SophosSenior Threat Analyst 1