Quick Summary
About Us Sophos is a cybersecurity leader defending 600,000 organizations globally with an AI-driven platform and expert-led services.
Sophos is seeking an experienced Incident Response Analyst to support Managed Detection and Response (MDR) customers within the Critical Incident Response Unit (CIRU).
As an Incident Response Analyst 3, you will lead the investigative stream of active cyber incidents, performing advanced forensic, analytical, and containment tasks across diverse customer environments. You will operate with moderate autonomy, serve primarily in an Incident Responder role, and support Advisors by validating findings, shaping investigative direction, and preparing technical context for customer communication. This role acts as a bridge between junior responders and senior analysts, ensuring technical accuracy, investigative consistency, and high quality documentation throughout the engagement.
- Utilize Sophos technologies to investigate, contain, and respond to cyber incidents
- Conduct analysis of cyber incidents for malware, ransomware, and other common attack types
- Maintain accurate and detailed documentation for analysis performed during cyber incidents
- Recognize and codify attacker tools, tactics, and procedures that can be applied to current and future investigations and tooling
- Provide clear and concise communication to MDR customers during cyber incidents
- Work closely with internal SophosLabs, Detection Engineering, and Threat Hunting teams to continuously expand and improve detection logic
- Work closely with Sophos MDR Operations teams in providing response, remediation guidance, and excellent customer service
- Assist in creating accurate and detailed technical incident reports as a post-incident deliverable for MDR customers and MSPs
- Essential skills:
- 3-6 years of experience conducting cyber security investigations in a methodical manner and investigating threats
- Knowledge of incident response toolsets, methodologies, and techniques
- Experience creating technical documentation and technical reports
- Ability to work under high-pressure situations, when response time matters, to disrupt adversary activity
- Network and endpoint (macOS, Linux, Windows) investigation experience; IDS, IPS, EDR, and basic malware analysis
- Basic understanding of at least one of the following: OSQuery, SQL, and KQL
- Knowledge of frameworks such as MITRE Attack and Cyber Kill Chain
- Ability to work some weekends and holidays
- Experience with Windows and Linux command and script interpreters
- Desired skills:
- Cyber security certifications (GCIH, CompTIA Sec+, eJPT, etc.)
- Experience with incident response investigations, handling malware, and performing response actions to contain and/or neutralize threats
- Experience calling customers and providing excellent customer service
Location & Eligibility
Listing Details
- Posted
- April 20, 2026
- First seen
- April 20, 2026
- Last seen
- May 1, 2026
Posting Health
- Days active
- 10
- Repost count
- 0
- Trust Level
- 37%
- Scored at
- May 1, 2026
Signal breakdown
Please let Sophos know you found this job on Jobera.
3 other jobs at Sophos
View all →Explore open roles at Sophos.
Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.