Incident Response Analyst

Abingdon, GB, OX14 3YP

Technology Office

Sophos Overview – Cybersecurity Evolved

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today’s most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.

Job Purpose

Sophos Managed Threat Response (MTR) is an elite team of threat hunters and incident response experts who work on behalf of our customers to investigate and neutralize the most sophisticated of threats.

As an Incident Response Analyst, you will work with customers who are experiencing an active cyber incident, to quickly investigate, contain and assist with their recovery. You will work with both large and small organizations across multiple countries and levels of technical maturity.


Main Duties

  • Coordinate response efforts to cyber incidents, helping customers through difficult and stressful times, that may involve nontraditional working hours,
  • Perform incident response investigations, containment and root cause analysis activities across multiple platforms and systems including Windows, Mac, Linux/Unix estates
  • Analyzes designs or develops information systems based on computer or other technologies
  • Utilize Sophos tools to conduct large-scale investigations and examine endpoint and network-based evidence
  • Develop and continuously improve incident response methods and countermeasures
  • Produce high-quality written and verbal communications, recommendations, and findings to customer stakeholders
  • Recognize and codify attacker tools, tactics, and procedures that can be applied to current and future investigations and tooling
  • Help lead small to medium-sized projects as directed by leadership
  • Work with SophosLabs, security and IT teams to implement remediation plans in response to security incidents
  • Maintain awareness of current cybersecurity tools and threat landscape in order to advise customers appropriately


Skills and attributes for success

  • Resolution of security incidents by identifying root cause and security posture improvement recommendations
  • Collect and analyze evidence to provide fact-based reports to customers with varying levels of technical understanding
  • Demonstrate a professional, calm, and expert manner at all times, while also being able to show leadership during stressful situations



Skills & Experience



  • Several years of experience conducting or managing incident response investigations in a methodical manner for organizations and investigating targeted threats impacting customer environments
  • Deep understanding of security threats, vulnerabilities and ‘Living off the Land’ techniques
  • Understanding of electronic investigation, forensic tools, and methodologies, including log correlation and analysis, forensically handling electronic data, knowledge of computer security investigative processes, malware identification and analysis
  • Open to work outside of standard business hours including weekends and holidays
  • Able to thrive within a team environment as well as on an individual basis
  • Ability to work shift work including weekend, on-call shifts and rotational shifts



  • Network and Endpoint security experience; IDS, IPS, EDR, Malware defences and monitoring experience
  • Threat hunting experience preferred
  • Knowledge of MITRE’s ATT&CK framework preferred
  • Working knowledge of incident response procedures
  • Experience with SQL and OSquery is a plus
  • Understanding of Windows event log analysis
  • Advanced Information Security certifications preferred but not required




Equal Opportunities

Sophos is committed to equal opportunity in all areas of its work. All qualified applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, marital status, race, religion, colour, age, disability or sexual orientation.

If you choose to explore this opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos.  If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights.  If you have any questions about Sophos’ data protection practices, please contact dataprotection@sophos.com.


Job Number: 5233

At Sophos, we want every organization to be protected by innovative, next-generation IT security, even those who don't have a huge IT staff. We protect organizations of all sizes, all around the world by making enterprise-grade security that is simple to deploy, manage, and use. It is our passion, and something we are truly proud of.

Job Segment: Information Systems, SQL, Linux, Database, Unix, Technology