Sophos
Sophos4mo ago

Threat Analyst

IndiaIndiaRemotePermanentmid
SecurityOtherThreat Analyst
0 views0 saves0 applied

Quick Summary

Overview

About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025,

Technical Tools
SecurityOtherThreat Analyst
About Us
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.

Role Summary
As an MDR Threat Analyst, you will work with enterprise systems, log analysis systems, and endpoint collection systems to facilitate the investigation, identification and neutralization of cyber threats. You will work alongside and contribute to a team of analysts with the objective of providing best in class monitoring, detection and response services.  
This role offers an opportunity to grow investigative expertise, work closely with senior analysts, and participate in real-world threat response while helping strengthen the organization’s overall security posture. 
  • Investigate escalated security alerts and incidents across endpoint, network, cloud, and identity environments.
  • Perform structured analysis to determine root cause, attack scope, lateral movement, and potential impact.
  • Support ransomware investigations by analysing attacker activity, credential abuse, persistence mechanisms, and malware behaviour.
  • Deobfuscate suspicious scripts, malware samples, and other indicators to identify malicious activity.
  • Conduct proactive threat hunts based on defined hypotheses and emerging threat intelligence.
  • Investigate suspicious authentication activity, privilege escalation, and identity misuse.
  • Perform investigations on both Windows and Linux systems, including log and process analysis.  
  • Correlate data across multiple sources, including EDR, SIEM, cloud logs, and identity platforms.
  • Document investigative findings clearly and provide actionable remediation guidance to clients. 
  • Collaborate with senior analysts during high-severity or complex incidents. 
  • Contribute to detection tuning and improvement of response playbooks based on investigation outcomes. 
  • Participate in a rotational schedule supporting a 24x7x365 MDR environment. 
  • 4–6 years of experience in a SOC, MDR, Incident Response, or related cybersecurity operations role.
  • Experience investigating endpoint and network security alerts using EDR and SIEM platforms.
  • Working knowledge of ransomware attack patterns and common intrusion techniques.
  • Hands-on experience investigating Linux and Windows systems.
  • Experience analysing obfuscated scripts, malware behaviour, and performing deobfuscation to identify malicious activity.
  • Familiarity with adversary tactics and techniques, and practical exposure to the MITRE ATT&CK framework.
  • Experience analysing Windows Event Logs, Linux logs, and Active Directory fundamentals.
  • Basic understanding of cloud and identity security investigations, including suspicious authentication activity and privileged account misuse.
  • Ability to analyse network traffic, including TCP/IP, DNS, and HTTP/S.
  • Scripting knowledge, including PowerShell; Python or other languages is mandatory.
  • Strong documentation skills and attention to investigative detail.
  • Security certifications such as Security+, CySA+, GCIH, or equivalent are a plus. Bachelor’s degree in Information Technology, Computer Science, or related field, or equivalent professional experience.
  • Strong analytical and troubleshooting skills.
  • Ability to manage multiple investigations in a fast-paced environment.
  • Clear written and verbal communication skills.
  • Location & Eligibility

    Where is the job
    India
    Remote within one country
    Who can apply
    Open to applicants worldwide
    Listed under
    India

    Listing Details

    Posted
    December 8, 2025
    First seen
    April 9, 2026
    Last seen
    April 28, 2026

    Posting Health

    Days active
    19
    Repost count
    0
    Trust Level
    32%
    Scored at
    April 28, 2026

    Signal breakdown

    freshnesssource trustcontent trustemployer trust
    Sophos
    Sophos
    lever
    Employees
    3k+
    Founded
    2019
    View company profile
    Newsletter

    Stay ahead of the market

    Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

    A
    B
    C
    D
    Join 12,000+ marketers

    No spam. Unsubscribe at any time.

    SophosThreat Analyst