What You Will Do
インシデント対応およびデジタルフォレンジック調査の実施
複数のホストや広範なネットワークに及ぶ複雑なインシデントについて、痕跡/データを収集・分析し、他のコンサルタントによる調査結果の検証を通じて技術的調査を実施
インシデント調査結果と推奨される対応策を報告書にまとめ、事後報告会で発表
脅威インテリジェンスチーム(Counter Threat Unit / CTU)およびテクニカルテストチームとの技術的な課題について情報共有を行う
技術実践トレーニングの講師
標的型攻撃に対する脅威ハンティングプロジェクトへの参加および主導
- Incident response and conducting digital forensic investigations
- Conduct technical investigation of complex incidents involving multiple hosts and extensive networks by collecting and analyzing trail/data and reviewing the findings by other consultants.
- Prepare reports on incident findings and recommended responses and present at debriefing sessions
- Communicate technical issues with the Threat Intelligence team (Counter Threat Unit / CTU) and Technical Testing team
- Instructor of technical hands-on training
- Participate and lead Threat Hunting projects against targeted attacks
What You Will Bring
インシデント対応、デジタルフォレンジック、またはネットワークフォレンジックの分野で3年以上の実務経験
Encase、FTK、X-Ways、F-Response、Volatility、または1つ以上のオープンソースフォレンジックツールの使用経験が1年以上あること
高度な技術コミュニケーション能力(口頭および書面)。インシデント発生時に顧客と連携して複雑なセキュリティ問題を解決し、顧客管理部門に報告する能力など
マルウェア分析の経験があること
脆弱性およびそれらの検出・分析ツールに関する知識
コンピュータサイエンス、コンピュータ工学、電子工学、または関連技術分野の学士号、もしくは同等の実務経験
オペレーティングシステム管理(Microsoft Windows/Linux)の経験があること
攻撃者の動機、および攻撃者が使用する技術・戦略・手順に関する理解
ISO 27001/2、FISMA、PCI、HITRUST、NIST 800シリーズ、CoBIT、PCIのいずれか、または複数の規格に関する知識
部門責任者・経営陣への報告経験、および技術レベルや組織役割が異なる顧客担当者に合わせた技術内容の報告経験
GREM、GCFA、GCFE、CISA、またはCISSPのいずれかの資格を保有していること
英語でのコミュニケーション能力
日本語ネイティブレベル(最低限、ビジネスレベルの日本語能力が必要)
- At least 1 year experience with Encase, FTK, X-Ways, F-Response, Volatility, or one or more open source forensic tool(s)
- Experience in malware analysis
- Understanding of vulnerabilities and the tools to detect and analyze them
- Bachelor of Science degree in computer science, computer engineering, electronics, or related technical field, or equivalent work experience
- Experience with operating system administration (Microsoft Windows/Linux)
- Understanding of attacker motivation and the techniques, strategies, and procedures used by attackers
- Understanding of one or more of the following: ISO 27001/2, FISMA, PCI, HITRUST, NIST 800-series, CoBIT, PCI
- Experience reporting to department heads and management and reporting technical content tailored to customer contact profiles of varying technical levels and organizational roles
- At least one certification in GREM, GCFA, GCFE, CISA or CISSP
- Communication in English
- Native-level Japanese language skills (At minimum, business-level Japanese language skills are required)
Skills Required
- At least 1 year experience with Encase, FTK, X-Ways, F-Response, Volatility, or one or more open source forensic tool(s)
- Experience in malware analysis
- Bachelor of Science degree in computer science, computer engineering, electronics, or related technical field, or equivalent work experience
- Experience with operating system administration (Microsoft Windows/Linux)
- At least one certification in GREM, GCFA, GCFE, CISA or CISSP
Sophos Compensation & Benefits Highlights
The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Sophos and has not been reviewed or approved by Sophos.
-
Leave & Time Off Breadth — Time away is positioned as broad, with company-wide wellness days plus dedicated learning days and paid volunteer time.
-
Parental & Family Support — Family-related leave appears more comprehensive than baseline offerings, including paid parental leave, caregiver leave, and extended bereavement leave.
-
Wellbeing & Lifestyle Benefits — Wellbeing support is emphasized through always-available assistance resources and a Calm subscription, suggesting a lifestyle-oriented benefits approach.
Sophos Insights
What We Do
Cybersecurity Evolved. As a worldwide leader in next-generation cybersecurity, Sophos protects nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.
.jpeg)
.png)





