Listing Description
Position Overview
Vectra is seeking a highly skilled and experienced MDR (Managed Detection and Response) Security Analyst to join our team. As a Security Analyst, you will serve in a critical role in protecting and defending Vectra MDR customer infrastructure. You will be responsible for monitoring and analyzing security events, responding to incidents, conducting SOC (Security Operations Center) operations, and assisting MDR customers to ensure their needs are met. A successful candidate will have sound technical experience and skills, blended with strong interpersonal, communication, and project management skills.
The location for this role can be in Europe or UK. Our Security Analyst work on a 4x10 schedule.
Responsibilities
- Monitor security logs and alerts from various sources, including intrusion detection systems, Endpoint Detection and Response (EDR) systems, and security information and event management (SIEM) tools.
- Investigate and analyse security incidents, identify root cause, and develop appropriate mitigation strategies.
- Execute security response actions, including full remote remediation of endpoints.
- Perform threat hunting and proactive analysis to identify potential security risks and vulnerabilities.
- Collaborate with cross-functional teams, including product, engineering, and support, to resolve customer incidents or issues.
- Mentor and provide guidance to junior security analysts, sharing knowledge and best practices.
- Conduct health checks and architecture reviews, providing technical expertise and real-life experience in creating solutions, designs, and recommendations.
- Be a strong voice for your customers across business to identify new detection models, identify new product features, build content for both internal and external customer knowledge bases, and ensure successful Vectra deployments.
- Travel expected 0-5
Requirements
- Proven experience as an MDR security analyst, SOC analyst, or similar role in a fast-paced environment.
- Experience providing remote response and remediation activities within networks and on endpoints.
- Strong understanding of intrusion detection systems, artificial intelligence-based attack detection and prevention, incident response methodologies, and SOC operations.
- Experience with SIEM tools, log analysis, network analysis, endpoint analysis, and threat intelligence platforms.
- Solid knowledge of operating systems, networking protocols, and security technologies.
- Proficient in incident handling, threat hunting, and forensics.
- Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
- Strong communication skills to effectively collaborate with cross-functional teams and communicate complex security issues to non-technical stakeholders.
- Continuous learning mindset to stay updated with the evolving threat landscape and emerging security technologies.
Desirable
- Prior experience with Vectra, SentinelOne, Microsoft Defender, or CrowdStrike
- Coding experience in Bash, Python, or Powershell
- Open-source development
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided