This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

The New York State wants YOU to start a career here!

To post a job, login or create an account |  Post a Job

SOC Analyst


This is a Full-time position in New York, NY posted January 9, 2022.

Cybereason gives organizations the upper hand by taking an entirely new approach to cybersecurity with AI Hunting, the first AI-powered technology that answers the question “Am I under attack?” proactively, without manual effort.  We’re expanding our security services and looking for curious, diligent, technical people to help us build out and run our Nocturnus team.

 As member of this elite team you’ll be working closely with some of the best minds in incident response, malware analysis and security research, partnering with the highly skilled defense teams of our customers, and against some of the most advanced adversaries out there.

You will experience and investigate attacks that no one else has seen before.

Cybereason is looking for curious, diligent, technical people to be a part of our Global SOC team.

As a member of this elite team, you’ll take an integral role within a 24×7 operational SOC, providing Managed Detection and Response (MDR) services to large organizations around the globe.

You’ll be working closely with some of the best minds in incident response, malware analysis, and security research, partnering with our customers and partners to defend against the most advanced adversaries.

What You’ll Be Doing:

  • Performing ongoing security analysis and triage of endpoint, network, mobile, and cloud alerts.
  • Participating in various stages of incident investigations and threat hunting engagements 
  • Writing and delivering detailed investigation and analysis reports while maintaining technical documentation
  • Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives
  • Analyzing, triaging, and remediating security incidents within defined SLAs
  • Working closely with internal company teams (such as Product, Customer Success, etc.)

What We’re Looking For:

  • 4+ years of experience working in IT security
  • 2+ years of relevant cybersecurity experience in Incident Response, endpoint security, digital forensics, and a strong knowledge working in a 24×7/follow-the-sun SOC
  • Background and experience in at least one of the following is a must:
    • Malware analysis, Threat Intelligence, Penetration Testing, Incident Response, Reverse Engineering, or Digital Forensics.
  • Strong knowledge of modern operating systems (Windows – a must, OS X and Linux – advantage)
  • Solid foundation in networking protocols and architectures
  • Experience with security tools and frameworks, particularly with open-source tools (such as Sysinternals, OLE tools, Volatility, debuggers, disassemblers, etc.)
  • Experience with a scripting language (Python, Bash, PowerShell, etc.)
  • Self-motivated and results-oriented; capable of leading and completing assignments without supervision
  • Strong organizational skills and ability to handle a wide range of tasks and re-prioritize them on short notice
  • Motivation to constantly improve processes and methodologies
  • Ability to dive deep into a problem
  • Able both independently as well collaborate within a team in a remote work setting.
  • Excellent interpersonal, verbal and written communication skills, ability to elucidate technical content to non-technical personnel 
  • Good written and oral communication skills, experience working with international customers
  • Native-level or technical fluency in both  German and English a must

Strong advantage to candidates with solid background in:

  • Endpoint security, threat analysis, and DFIR