At a Glance
- Tasks: Hunt for cyber threats and protect our customers from attacks.
- Company: Join a $13+ billion global tech leader with a startup mindset.
- Benefits: Full-time role with competitive salary and growth opportunities.
- Other info: Dynamic 24x7 environment with potential travel opportunities.
- Why this job: Make a real impact in cybersecurity while developing your skills.
- Qualifications: Experience with SIEMs, EDRs, and strong scripting skills required.
The predicted salary is between 50000 - 60000 £ per year.
We are a $13+ billion global technology company, home to more than 224,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud, and AI, powered by a broad portfolio of technology services and products. HCLTech is a globally recognized leader in the Tech and IT industry, but we’ve never forgotten the startup mindset that got us here. We’ve always approached our work with an idea-first attitude because every one of our accomplishments — no matter how big or small — can be traced back to an idea’s single spark.
Role: SOC Operations
Location: Coventry, UK
Job Type: Full onsite
Employment Type: Full time employment
Skill Required:
- Any one of the 2 SIEMs (Splunk, Microsoft Sentinel, Google Chronicle, PaloAlto XSIAM)
- EDR experience in 2 EDRs (SentinelOne, Microsoft XDR, Crowdstrike, PaloAlto XDR)
Job Summary:
Perform threat hunting for our customers.
Technical Skills:
- Expertise in SIEM/SOAR platforms.
- Strong understanding of MDR, XDR, SIEM and SOAR.
- Proficiency in Kusto Query Language (KQL) for advanced threat hunting.
- Deep knowledge of Windows, macOS, and Linux endpoint security and attack techniques (MITRE ATT&CK framework).
- Experience in forensic investigations and malware analysis.
- Strong scripting and automation skills (PowerShell, Python preferred).
- Familiarity with cloud security (Azure Defender, M365 Defender, Defender for Cloud).
Should have a strong understanding of various types of threat intelligence and be able to perform IOC as well as hypothesis-based threat hunting. Should have a good understanding of OS namely Windows, Linux and MAC. Should have a strong understanding of latest threats. Experience in creating reports for threat hunting based on various KPIs. Experience in understanding various types of threat intelligence.
Soft Skills:
- Good verbal/written communication skills.
- Willingness to work in 24x7 environments.
- From time-to-time travel opportunities may be assigned.
- Continual system improvement mindset and able to demonstrate in work.
- Client facing technical analysis report and presentation skills.
Cyber Threat Investigator in Bradford employer: HCLTech
Contact Detail:
HCLTech Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Investigator in Bradford
✨Tip Number 1
Network like a pro! Reach out to current employees at HCLTech on LinkedIn or other platforms. Ask them about their experiences and any tips they might have for landing a role as a Cyber Threat Investigator.
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can confidently discuss SIEM/SOAR platforms and demonstrate your knowledge of threat hunting techniques. We want to see that spark in you!
✨Tip Number 3
Showcase your passion for cybersecurity! During interviews, share any personal projects or experiences related to threat hunting or malware analysis. This will help us see your dedication and enthusiasm for the field.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows us you’re serious about joining our team at HCLTech.
We think you need these skills to ace Cyber Threat Investigator in Bradford
Some tips for your application 🫡
Show Your Spark: When writing your application, let your passion for cybersecurity shine through. We want to see that inner drive and creativity that sets you apart. Share specific examples of how you've tackled challenges or come up with innovative solutions in your previous roles.
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Investigator role. Highlight your experience with SIEMs and EDRs, and don’t forget to mention your skills in KQL and threat hunting. We love seeing relevant experience that aligns with what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to tell us why you’re the perfect fit for our team. Keep it concise but impactful, and make sure to connect your skills and experiences directly to the job description. We want to know how you can contribute to our mission!
Apply Through Our Website: We encourage you to apply through our website for a smoother process. It helps us keep track of applications and ensures you get all the updates. Plus, it’s super easy to do – just follow the prompts and submit your materials!
How to prepare for a job interview at HCLTech
✨Know Your Tech Inside Out
Make sure you’re well-versed in the specific SIEMs and EDRs mentioned in the job description. Brush up on your knowledge of Splunk, Microsoft Sentinel, and the other tools listed. Being able to discuss your hands-on experience with these technologies will show that you’re not just familiar but truly capable.
✨Master the MITRE ATT&CK Framework
Since the role involves deep knowledge of attack techniques, take some time to review the MITRE ATT&CK framework. Be prepared to discuss how you've applied this knowledge in past roles or projects. This will demonstrate your understanding of threat hunting and your ability to think critically about security challenges.
✨Show Off Your Scripting Skills
If you have experience with PowerShell or Python, be ready to share examples of how you’ve used scripting to automate tasks or improve processes. This is a key skill for the role, and showcasing your ability to write scripts can set you apart from other candidates.
✨Communicate Clearly and Confidently
Since client-facing skills are important, practice explaining complex technical concepts in simple terms. During the interview, focus on clear communication and be ready to present any relevant reports or findings from your previous work. This will highlight your ability to convey information effectively, which is crucial in this role.