At a Glance
- Tasks: Hunt for cyber threats and conduct forensic investigations to protect our customers.
- Company: Join a $13+ billion global tech leader with a startup mindset.
- Benefits: Full-time role with opportunities for travel and continuous improvement.
- Other info: Work in a 24x7 environment with excellent career growth opportunities.
- Why this job: Make a real impact in cybersecurity while developing your skills in a dynamic environment.
- Qualifications: Experience with SIEMs, EDRs, and strong scripting skills required.
The predicted salary is between 50000 - 60000 £ per year.
We are a $13+ billion global technology company, home to more than 224,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud, and AI, powered by a broad portfolio of technology services and products. HCLTech is a globally recognized leader in the Tech and IT industry, but we’ve never forgotten the startup mindset that got us here. We’ve always approached our work with an idea-first attitude because every one of our accomplishments — no matter how big or small — can be traced back to an idea’s single spark. It’s that spark — that inner drive — that sets our people apart from our competitors. It enables us not just to pull off game-changing feat after game-changing feat but to better our world in the process. We want you to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled.
Role: SOC Operations
Location: Coventry, UK
Job Type: Full onsite
Employment Type: Full time employment
Skill Required:
- Any one of the 2 SIEMs (Splunk, Microsoft Sentinel, Google Chronicle, PaloAlto XSIAM)
- EDR experience in 2 EDRs (SentinelOne, Microsoft XDR, Crowdstrike, PaloAlto XDR)
Job Summary: Perform threat hunting for our customers
Technical Skills:
- Expertise in SIEM/SOAR platforms.
- Strong understanding of MDR, XDR, SIEM and SOAR.
- Proficiency in Kusto Query Language (KQL) for advanced threat hunting.
- Deep knowledge of Windows, macOS, and Linux endpoint security and attack techniques (MITRE ATT&CK framework).
- Experience in forensic investigations and malware analysis.
- Strong scripting and automation skills (PowerShell, Python preferred).
- Familiarity with cloud security (Azure Defender, M365 Defender, Defender for Cloud).
Should have a strong understanding of various types of threat intelligence. Should be able to perform IOC as well as Hypothesis based threat hunting. Should have a good understanding of OS namely Windows, Linux and MAC. Should have strong understanding of latest threats. Experience in creating reports for threat hunting based on various KPIs. Experience in understanding various types of threat intelligence.
Soft skills:
- Shall have good verbal/written communication skills.
- Should be willing to work in 24x7 environments.
- From time-to-time travel opportunities may be assigned.
- Incumbent should carry continual system improvement mindset and able to demonstrate in work.
- Client facing technical analysis report and presentation skills.
Cyber Threat Investigator in Plymouth employer: HCLTech
Contact Detail:
HCLTech Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Investigator in Plymouth
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at local meetups. You never know who might have the inside scoop on job openings or can put in a good word for you.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your threat hunting projects or any relevant scripts you've written. This gives potential employers a taste of what you can do.
✨Tip Number 3
Prepare for interviews by brushing up on common technical questions related to SIEM, EDR, and threat intelligence. Practise explaining your thought process during threat hunting scenarios to impress your interviewers.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Cyber Threat Investigator in Plymouth
Some tips for your application 🫡
Show Your Spark: When writing your application, let your passion for cybersecurity shine through! We want to see that inner drive and enthusiasm that sets you apart. Share your ideas and experiences that demonstrate how you've tackled challenges in the past.
Tailor Your Application: Make sure to customise your CV and cover letter for the Cyber Threat Investigator role. Highlight your experience with SIEMs and EDRs, and don’t forget to mention your skills in KQL and threat hunting. We love seeing how your background aligns with what we’re looking for!
Be Clear and Concise: Keep your application straightforward and to the point. Use clear language and avoid jargon unless it’s relevant to the role. We appreciate a well-structured application that makes it easy for us to see your qualifications and fit for the position.
Apply Through Our Website: We encourage you to submit your application directly through our website. It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it shows you’re serious about joining our team!
How to prepare for a job interview at HCLTech
✨Know Your Tech Inside Out
Make sure you’re well-versed in the specific SIEMs and EDRs mentioned in the job description. Brush up on your knowledge of Splunk, Microsoft Sentinel, and the others. Being able to discuss your hands-on experience with these tools will show that you’re not just familiar with them, but that you can actually use them effectively.
✨Master the MITRE ATT&CK Framework
Since a deep understanding of attack techniques is crucial, take some time to review the MITRE ATT&CK framework. Be prepared to discuss how you’ve applied this knowledge in past roles or projects. This will demonstrate your ability to think critically about threats and how to mitigate them.
✨Show Off Your Scripting Skills
If you have experience with PowerShell or Python, be ready to share examples of how you’ve used scripting to automate tasks or improve processes. This is a great way to highlight your technical skills and problem-solving abilities, which are key for a Cyber Threat Investigator.
✨Communicate Clearly and Confidently
Since good verbal and written communication skills are essential, practice explaining complex technical concepts in simple terms. You might be asked to present findings or reports, so being able to convey your ideas clearly will set you apart from other candidates.