About Us
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.
Role Summary
As a MDR Senior Threat Analyst on our Managed Detection and Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will lead, work alongside and contribute to a team of incident response analysts, cyber threat hunters, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.
Role Summary
As a MDR Senior Threat Analyst on our Managed Detection and Response (MDR) team, you will provide best-in-class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will lead, work alongside and contribute to a team of incident response analysts, cyber threat hunters, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.
Ready to Join Us?
At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply.
What's Great About Sophos?
· Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. While we are a remote first organization, applicants must have legal authorization to work in the jurisdiction where the position is posted, without requiring employer sponsorship.
· Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit
· Employee-led diversity and inclusion networks that build community and provide education and advocacy
· Annual charity and fundraising initiatives and volunteer days for employees to support local communities
· Global employee sustainability initiatives to reduce our environmental footprint
· Global fitness and trivia competitions to keep our bodies and minds sharp
· Global wellbeing days for employees to relax and recharge
· Monthly wellbeing webinars and training to support employee health and wellbeing
Our Commitment To You
We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy
Cybersecurity as a Service Delivered | SophosWhat You Will Do (Duties and Responsibilities)
Lead shift operations and coordinate response activities across the MDR SecOps team during assigned shifts
Mentor and guide lower tier analysts, providing technical expertise and escalation support for complex investigations
Oversee end-to-end analysis of sophisticated threats, coordinating multi-analyst investigations and ensuring comprehensive scope assessment
Drive technical decision-making during critical incidents, determining escalation paths and resource allocation
Lead threat hunting initiatives across the MDR customer base and coordinating team efforts
Refine detection logic, working with engineering teams to reduce false positives and improve detection efficacy
Serve as subject matter expert on advanced persistent threats, zero-day exploits, and emerging attack vectors
Coordinate cross-functional collaboration with adjacent projects
Use, maintain and develop internal playbooks, investigation methodologies, and technical documentation
Lead client escalations for high-severity incidents, providing technical briefings and coordinating remediation efforts
Participate in continuous improvement initiatives within the SOC, identifying process gaps and implementing solutions
Manage shift handovers and ensure seamless 24/7 operations across global teams
Conduct in-depth malware analysis when required for complex investigations
Participate as a SOC representative in technical discussions with product teams, threat research, and customer success organizations when needed
Ensure knowledge transfer and capability development across the analyst team through training and mentorship
What You Will Bring (Experience and Qualifications)
5+ years of progressive experience in a SOC or advanced cybersecurity roles with demonstrated leadership capabilities
Advanced-level proficiency with endpoint and network security tools (EDR/XDR, SIEM, threat intelligence platforms) and ability to understand detection strategies
Advanced knowledge of Windows, Linux (macOS is a plus) environments including system internals, forensic artifacts, and attack surface analysis
Proven experience leading incident response efforts, coordinating cross-functional teams, and managing complex security investigations
Background in threat hunting with ability to develop hunting queries, and behavioral analytics
Demonstrated experience mentoring junior analysts and developing team capabilities through knowledge transfer and training
Deep understanding of MITRE ATT&CK framework, advanced persistent threat tactics, and emerging attack vectors
Experience with malware analysis and advanced forensic techniques for complex threat investigations
Ability to manage shift operations, coordinate global handovers, and maintain 24/7 SOC effectiveness
Experience working with adjacent teams (engineering, product, threat research) to drive security enhancements and tooling improvements
Track record of developing and implementing SOC processes, playbooks, and operational procedures
Industry certifications such as GCIH, GCFA, GNFA, CISSP, or equivalent are desirable
Bachelor's degree in Information Technology, Computer Science, Cybersecurity or related field, or equivalent extensive practical experience
Fluent English communication skills with ability to articulate complex technical concepts to diverse audiences
Flexibility to work rotating shifts including nights, weekends, and holidays as part of 24x7x365 operations