SOC Analyst Tier 1

SOC Analyst Tier 1

Peterborough Full-Time 28800 - 43200 £ / year (est.) Home office possible
C

At a Glance

  • Tasks: Analyse and respond to security incidents while collaborating with top experts.
  • Company: Join Cybereason, a leader in innovative cybersecurity solutions worldwide.
  • Benefits: Enjoy remote work flexibility and a supportive, inclusive culture.
  • Why this job: Be part of a mission-driven team that values growth and teamwork.
  • Qualifications: 1+ years in a CIRT/SOC environment; familiarity with malware analysis is a plus.
  • Other info: Strong English skills required; multiple EMEA languages are an advantage.

The predicted salary is between 28800 - 43200 £ per year.

At Cybereason, we empower organizations around the world to take an entirely new approach to cybersecurity. Regardless of your role here, you will play an integral part in helping to empower our customers to reverse the attackers’ advantage and end attacks from endpoint to everywhere. Our deep understanding and embodiment of our Core Values unites us as an organisation and empowers us to put our best foot forward. Each day we strive to win as one, be daring, evolve, and never, ever, give up as we work on our shared mission. Throughout our global organisation, whether working from remote, hybrid or in an office, we foster a culture that embraces all people, empowering each of us to be us (#UbU). If you’re looking to join an organisation deeply rooted in their values that empowers their employees to do their best work, whatever that work might be, come join our EMEA Organisation!

Cybereason is looking for curious, diligent, technical people to be a part of our Global Security Operations team. As a member of this elite team, you’ll take an integral role, providing Managed Detection and Response (MDR) and Managed Extended Detection and Response (MXDR) services to large organisations around the globe. You’ll be working closely with some of the best minds in incident response, malware analysis, and security research, partnering with our customers and partners to defend against the most advanced adversaries.

We value our people and empower them to work remotely. As we operate a ‘follow the sun’ global model we don’t ask our people to work unsociable hours.

What You’ll Be Responsible For:

  • Analysing, triaging, and remediating security incidents (MDR)
  • Applying your expertise to piece together the attack chain across customers complex environments including cloud, identity, email, network, and endpoint (MXDR)
  • Participating in various stages of incident investigations including taking decisive steps to respond to active breaches and protect our customers
  • Engaging in customer-facing interactions at all levels from SOC analysts to c-suite executives
  • Working closely with internal company teams (such as Product, Customer Success, etc.)

What We Are Looking For:

  • Previous experience in a CIRT/SOC environment. 1+ years of experience is an advantage.
  • General familiarity with malware and its techniques (e.g., code injection, fileless execution, maintaining persistence)
  • Familiarity with static and behavioral malware analysis methods and tools (e.g., sandbox environments)
  • Background and experience in at least two of the following is an advantage: Endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics
  • Familiarity with common operating system concepts (e.g., processes, threads, DLLs, parent-child process relationships, scheduled tasks)
  • Solid foundation in networking protocols and architectures
  • Experience with a scripting language (Python, Bash, PowerShell, etc.)
  • Self-motivated and results-oriented; capable of leading and completing assignments without supervision
  • Strong organisational skills and ability to handle a wide range of tasks and re-prioritise them on short notice
  • Motivation to constantly improve processes and methodologies
  • Able both independently as well collaborate within a team in a remote work setting
  • Excellent interpersonal, verbal and written communication skills, ability to elucidate technical content to non-technical personnel
  • Must have excellent English reading, writing, and speaking skills
  • Strong advantage to candidates with multiple EMEA languages

SOC Analyst Tier 1 employer: Cybereason

At Cybereason, we pride ourselves on being an exceptional employer that champions a culture of empowerment and collaboration. Our commitment to employee growth is evident through our supportive work environment, where you can thrive in a remote or hybrid setting while working alongside industry leaders in cybersecurity. Join us to be part of a mission-driven team that values your contributions and encourages you to evolve in your career.
C

Contact Detail:

Cybereason Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Analyst Tier 1

✨Tip Number 1

Familiarise yourself with the specific tools and technologies mentioned in the job description, such as malware analysis methods and scripting languages like Python or PowerShell. This will not only boost your confidence but also demonstrate your proactive approach to learning.

✨Tip Number 2

Engage with the cybersecurity community through forums, webinars, or local meetups. Networking with professionals in the field can provide valuable insights and potentially lead to referrals for the SOC Analyst position at Cybereason.

✨Tip Number 3

Prepare to discuss real-world scenarios during interviews, particularly those involving incident response and threat hunting. Being able to articulate your thought process and decision-making in these situations will set you apart from other candidates.

✨Tip Number 4

Showcase your soft skills, especially your ability to communicate technical concepts to non-technical personnel. This is crucial for a role that involves customer-facing interactions, so think of examples where you've successfully done this in the past.

We think you need these skills to ace SOC Analyst Tier 1

Incident Response
Malware Analysis
Threat Hunting
Penetration Testing
Digital Forensics
Reverse Engineering
Endpoint Security
Networking Protocols
Scripting (Python, Bash, PowerShell)
Analytical Skills
Problem-Solving Skills
Organisational Skills
Communication Skills
Customer Engagement
Team Collaboration

Some tips for your application 🫡

Understand the Role: Before applying, make sure you fully understand the responsibilities of a SOC Analyst Tier 1 at Cybereason. Familiarise yourself with the skills and experiences they are looking for, such as familiarity with malware analysis and incident response.

Tailor Your CV: Customise your CV to highlight relevant experience in CIRT/SOC environments, malware analysis, and any scripting languages you know. Use specific examples that demonstrate your skills and achievements in these areas.

Craft a Compelling Cover Letter: Write a cover letter that reflects your passion for cybersecurity and your alignment with Cybereason's core values. Mention how your background and skills make you a great fit for their team and how you can contribute to their mission.

Proofread Your Application: Before submitting, carefully proofread your application materials. Check for spelling and grammatical errors, and ensure that your writing is clear and concise. A polished application reflects your attention to detail and professionalism.

How to prepare for a job interview at Cybereason

✨Show Your Curiosity

As a SOC Analyst, curiosity is key. Be prepared to discuss how you've approached problem-solving in the past, especially when it comes to analysing security incidents. Share examples of how your inquisitive nature has led you to uncover critical information or improve processes.

✨Demonstrate Technical Knowledge

Brush up on your knowledge of malware techniques and analysis methods. Be ready to explain concepts like code injection or fileless execution, and discuss any tools you've used in static or behavioural analysis. This will show that you have the technical foundation needed for the role.

✨Highlight Team Collaboration

Cybereason values teamwork, so be sure to share experiences where you've successfully collaborated with others, especially in a remote setting. Discuss how you communicate technical information to non-technical team members and how you contribute to a positive team dynamic.

✨Prepare for Customer Interactions

Since you'll be engaging with customers at various levels, practice articulating complex security concepts in simple terms. Think of scenarios where you've had to explain technical issues to clients or stakeholders, and be ready to showcase your interpersonal skills during the interview.

SOC Analyst Tier 1
Cybereason
C
  • SOC Analyst Tier 1

    Peterborough
    Full-Time
    28800 - 43200 £ / year (est.)

    Application deadline: 2027-06-22

  • C

    Cybereason

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>