At a Glance
- Tasks: Hunt for cyber threats and protect our customers from attacks.
- Company: Join a $13+ billion global tech leader with a startup mindset.
- Benefits: Full-time role with competitive salary and growth opportunities.
- Other info: Dynamic 24x7 environment with potential travel opportunities.
- Why this job: Make a real impact in cybersecurity while developing your skills.
- Qualifications: Experience with SIEMs, EDRs, and strong scripting skills required.
The predicted salary is between 50000 - 60000 £ per year.
We are a $13+ billion global technology company, home to more than 224,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud, and AI, powered by a broad portfolio of technology services and products. HCLTech is a globally recognized leader in the Tech and IT industry, but we’ve never forgotten the startup mindset that got us here. We’ve always approached our work with an idea-first attitude because every one of our accomplishments — no matter how big or small — can be traced back to an idea’s single spark. It’s that spark — that inner drive — that sets our people apart from our competitors. It enables us not just to pull off game-changing feat after game-changing feat but to better our world in the process. We want you to find your spark. Because that’s what drives you to be better, be more and ultimately, be more fulfilled.
Role: SOC Operations
Location: Coventry, UK
Job Type: Full onsite
Employment Type: Full time employment
Skill Required:
- Any one of the 2 SIEMs (Splunk, Microsoft Sentinel, Google Chronicle, PaloAlto XSIAM)
- EDR experience in 2 EDRs (SentinelOne, Microsoft XDR, Crowdstrike, PaloAlto XDR)
Job Summary:
Perform threat hunting for our customers.
Technical Skills:
- Expertise in SIEM/SOAR platforms.
- Strong understanding of MDR, XDR, SIEM and SOAR.
- Proficiency in Kusto Query Language (KQL) for advanced threat hunting.
- Deep knowledge of Windows, macOS, and Linux endpoint security and attack techniques (MITRE ATT&CK framework).
- Experience in forensic investigations and malware analysis.
- Strong scripting and automation skills (PowerShell, Python preferred).
- Familiarity with cloud security (Azure Defender, M365 Defender, Defender for Cloud).
Should have a strong understanding of various types of threat intelligence. Should be able to perform IOC as well as Hypothesis based threat hunting. Should have a good understanding of OS namely Windows, Linux and MAC. Should have strong understanding of latest threats. Experience in creating reports for threat hunting based on various KPIs. Experience in understanding various types of threat intelligence.
Soft skills:
- Shall have good verbal/written communication skills.
- Should be willing to work in 24x7 environments.
- From time-to-time travel opportunities may be assigned.
- Incumbent should carry continual system improvement mindset and able to demonstrate in work.
- Client facing technical analysis report and presentation skills.
Cyber Threat Investigator in Southampton employer: HCLTech
Contact Detail:
HCLTech Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Investigator in Southampton
✨Tip Number 1
Network like a pro! Reach out to current employees at HCLTech on LinkedIn or other platforms. Ask them about their experiences and any tips they might have for landing a role as a Cyber Threat Investigator.
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can confidently discuss SIEM/SOAR platforms and demonstrate your knowledge of threat hunting techniques. We want to see that spark in you!
✨Tip Number 3
Showcase your passion for cybersecurity! Bring examples of your previous work, whether it's a project, a report, or even a blog post. This will help us see your dedication and expertise in action.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows you’re serious about joining our team at HCLTech.
We think you need these skills to ace Cyber Threat Investigator in Southampton
Some tips for your application 🫡
Show Your Spark: When writing your application, let your passion for cybersecurity shine through. We want to see that inner drive and creativity that sets you apart. Share specific examples of how you've tackled challenges in the past!
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Investigator role. Highlight your experience with SIEMs and EDRs, and don’t forget to mention your scripting skills. We love seeing relevant skills front and centre!
Craft a Compelling Cover Letter: Your cover letter is your chance to tell us why you're the perfect fit for our team. Be sure to connect your experiences with the job requirements and express your enthusiasm for working with us at HCLTech.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy to do!
How to prepare for a job interview at HCLTech
✨Know Your Tech Inside Out
Make sure you’re well-versed in the specific SIEMs and EDRs mentioned in the job description. Brush up on your knowledge of Splunk, Microsoft Sentinel, and the other tools listed. Being able to discuss your hands-on experience with these technologies will show that you’re not just familiar but truly capable.
✨Master the MITRE ATT&CK Framework
Since a deep understanding of attack techniques is crucial, take some time to review the MITRE ATT&CK framework. Be prepared to discuss how you've applied this knowledge in past roles, especially in threat hunting scenarios. This will demonstrate your analytical skills and your ability to think critically about security threats.
✨Show Off Your Scripting Skills
If you have experience with PowerShell or Python, be ready to share examples of how you’ve used scripting to automate tasks or improve processes. This is a great way to highlight your technical prowess and problem-solving abilities, which are key for a Cyber Threat Investigator.
✨Communicate Clearly and Confidently
Since good verbal and written communication skills are essential, practice explaining complex technical concepts in simple terms. You might be asked to present findings or reports, so being able to articulate your thoughts clearly will set you apart from other candidates.