×
Register Here to Apply for Jobs or Post Jobs. X

Threat Analyst

Job in Romania, Somerset County, Pennsylvania, USA
Listing for: Sophos
Full Time position
Listed on 2026-02-22
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Location: Romania

About Us

Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure‑play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry‑leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform.

Secureworks provides the innovative, market‑leading Taegis XDR/MDR, identity threat detection and response (ITDR), next‑gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other everyday and state‑sponsored cybercrimes.

The solutions are powered by historical and real‑time threat intelligence from Sophos X‑Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at

Role Summary

As a Threat Analyst - Tier II on our Managed Detection and Response (MDR) team, you will provide best‑in‑class monitoring, detection, and response services to proactively defend customer environments before attacks prevail. You will work alongside and contribute to a team of cyber threat hunters, incident response analysts, engineers, and ethical hackers by using enterprise, log analysis and endpoint collection systems to facilitate investigations, identification, and neutralization of cyber threats.

What

You Will Do
  • Monitor, investigate, and respond to alerts generated by the Sophos security stack (including EDR/XDR capabilities)
  • Lead and mentor Tier I Analysts through escalated cases, ensuring thorough and accurate investigation practices
  • Perform end‑to‑end analysis on suspicious activity to assess scope, impact, and risk
  • Identify and respond to cyber threats across customer environments using approved playbooks and tooling
  • Accurately document findings, investigative steps, and outcomes in the MDR case management platform
  • Conduct threat hunting to identify potential threats throughout the MDR customer base
  • Investigate phishing emails, suspicious binaries, and behavioral anomalies
  • Support detection tuning by identifying recurring false positives and suggesting improvements
  • Stay informed on threat actor behaviors, MITRE ATT&CK techniques, and Sophos threat research updates
  • Proactively research emerging IOCs, active exploits, and vulnerabilities to stay ahead of evolving threats
  • Contribute to internal knowledge bases, documentation, and continuous improvement initiatives
  • Participate in shift rotations and ensure timely, detailed handovers between global teams
  • Provide detection and response support for active security incidents
  • Manage case workflows: create cases, track progress, and follow up with clients until resolution
  • Engage with clients via chat, phone, and tickets as part of case handling
  • Assist with developing and refining Security Operations processes, playbooks, and tooling feedback
Essential
  • 2+ years of hands‑on experience in a Security Operations Center (SOC), Managed Detection and Response (MDR) environment, or cybersecurity‑focused IT role
  • Proficient in the use of endpoint and network security tools (e.g., EDR, IDS/IPS, malware detection platforms) with the ability to validate and triage complex alerts
  • Working knowledge of Windows operating systems (both workstation and server), with additional experience in Linux (Ubuntu, Debian, Red Hat) or macOS environments
  • Ability to interpret and analyze Windows event logs and other telemetry data
  • Understanding of core network concepts including TCP/IP, protocols, routing, and traffic analysis
  • Demonstrated experience contributing to real‑time incident response efforts and threat investigations
  • Exposure to threat…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary