At a Glance
- Tasks: Hunt for cyber threats and protect our customers from attacks.
- Company: Join a $13+ billion global tech leader with a startup mindset.
- Benefits: Full-time role with competitive salary and growth opportunities.
- Other info: Dynamic 24x7 environment with potential travel opportunities.
- Why this job: Make a real impact in cybersecurity while developing your skills.
- Qualifications: Experience with SIEMs, EDRs, and strong scripting skills required.
The predicted salary is between 50000 - 60000 £ per year.
We are a $13+ billion global technology company, home to more than 224,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud, and AI, powered by a broad portfolio of technology services and products. HCLTech is a globally recognized leader in the Tech and IT industry, but we’ve never forgotten the startup mindset that got us here.
Role: SOC Operations
Location: Coventry, UK
Job Type: Full onsite
Employment Type: Full time employment
Skill Required:
- Any one of the 2 SIEMs (Splunk, Microsoft Sentinel, Google Chronicle, PaloAlto XSIAM)
- EDR experience in 2 EDRs (SentinelOne, Microsoft XDR, Crowdstrike, PaloAlto XDR)
Job Summary:
Perform threat hunting for our customers.
Technical Skills:
- Expertise in SIEM/SOAR platforms.
- Strong understanding of MDR, XDR, SIEM and SOAR.
- Proficiency in Kusto Query Language (KQL) for advanced threat hunting.
- Deep knowledge of Windows, macOS, and Linux endpoint security and attack techniques (MITRE ATT&CK framework).
- Experience in forensic investigations and malware analysis.
- Strong scripting and automation skills (PowerShell, Python preferred).
- Familiarity with cloud security (Azure Defender, M365 Defender, Defender for Cloud).
- Strong understanding of various types of threat intelligence.
- Able to perform IOC as well as hypothesis based threat hunting.
- Good understanding of OS namely Windows, Linux and MAC.
- Strong understanding of latest threats.
- Experience in creating reports for threat hunting based on various KPIs.
- Good verbal/written communication skills.
- Willing to work in 24x7 environments.
- Client facing technical analysis report and presentation skills.
From time-to-time travel opportunities may be assigned. The incumbent should carry a continual system improvement mindset and be able to demonstrate it in work.
Cyber Threat Investigator in Coventry employer: HCLTech
Contact Detail:
HCLTech Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Investigator in Coventry
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. We all know that sometimes it’s not just what you know, but who you know that can help you land that Cyber Threat Investigator role.
✨Tip Number 2
Prepare for those interviews by brushing up on your technical skills and understanding the latest threats. We recommend doing mock interviews with friends or using online platforms to get comfortable with common questions related to SIEM and threat hunting.
✨Tip Number 3
Showcase your passion! When you’re in an interview, let your enthusiasm for cybersecurity shine through. Talk about your personal projects or any relevant experiences that highlight your skills in threat hunting and automation.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take the initiative to connect directly with us.
We think you need these skills to ace Cyber Threat Investigator in Coventry
Some tips for your application 🫡
Show Your Spark: When writing your application, let your passion for cybersecurity shine through. We want to see that inner drive and enthusiasm that sets you apart. Share your unique ideas and experiences that demonstrate how you can contribute to our team.
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Investigator role. Highlight your experience with SIEMs, EDRs, and any relevant technical skills. We love seeing how your background aligns with what we’re looking for, so don’t hold back!
Craft a Compelling Cover Letter: Your cover letter is your chance to tell us why you’re the perfect fit for this role. Be specific about your skills in threat hunting and your familiarity with the MITRE ATT&CK framework. We want to know how you can make an impact at HCLTech!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re serious about joining our team!
How to prepare for a job interview at HCLTech
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of SIEM/SOAR platforms and the specific tools mentioned in the job description, like Splunk or Microsoft Sentinel. Be ready to discuss your hands-on experience with these technologies and how you've used them in threat hunting.
✨Master KQL and Scripting Skills
Since proficiency in Kusto Query Language (KQL) is crucial, practice writing queries that could help in advanced threat hunting scenarios. Also, be prepared to showcase your scripting skills in PowerShell or Python, as this will demonstrate your ability to automate processes effectively.
✨Understand the Threat Landscape
Familiarise yourself with the latest threats and attack techniques, especially those related to the MITRE ATT&CK framework. Being able to discuss recent incidents or trends in cyber threats will show your passion and commitment to staying updated in the field.
✨Communicate Clearly and Confidently
Since client-facing skills are important, practice explaining complex technical concepts in simple terms. Prepare to present a mock analysis report during the interview, highlighting your ability to communicate findings effectively to both technical and non-technical audiences.