What You Will Do
- Develop countermeasures to detect advanced threats based on research and intelligence from the CTU team.
- Analyze endpoint behaviors and logs to design detections using multi-source telemetry.
- Continuously refine and monitor detection rules to optimize the signal-to-noise ratio for alerts.
- Research and implement alert handling for new device ingestions, ensuring high-value signal delivery.
- Leverage internal tooling to distinguish native from standard integrations for detection accuracy.
- Collaborate on the development of internal tools, automation, and detection infrastructure.
- Act as a subject matter expert across departments including Product Management, Marketing, and Labs Research.
What You Will Bring
- Strong passion for cybersecurity research and the ability to quickly learn emerging technologies.
- Hands-on experience in scripting languages (PowerShell, Bash, Python) and use of Python data science libraries (e.g., NumPy, Pandas, Matplotlib).
- Knowledge of CI/CD pipelines, testing frameworks, and automation principles.
- Proficiency in analyzing logs from firewalls, proxies, and security infrastructure to identify anomalies.
- Familiarity with event logs, traffic pattern anomalies, and threat hunting methodologies.
- Strong understanding of endpoint detection, Linux/Unix and Windows OS internals, vulnerability identification, and workflow automation.
- Forensic analysis of memory and disk images across various OS and file system types is a plus.
- Experience in malware analysis, including static/dynamic techniques and reverse engineering (IA32/64, ARM binaries) is a plus.
- Experience with event correlation and incident reconstruction using log data is a plus.
- Network traffic analysis skills, including identification of anomalous or malicious traits is a plus.
- Solid grasp of database querying, systems architecture, and process automation for operational improvements is a nice to have.
Skills Required
- Hands-on scripting experience with PowerShell, Bash, and Python
- Experience using Python data libraries (NumPy, Pandas, Matplotlib)
- Knowledge of CI/CD pipelines, testing frameworks, and automation principles
- Proficiency analyzing logs from firewalls, proxies, and security infrastructure
- Familiarity with event logs, traffic pattern anomalies, and threat hunting methodologies
- Strong understanding of endpoint detection and Linux/Unix and Windows OS internals
- Forensic analysis of memory and disk images across various OS and file systems
- Malware analysis including static/dynamic techniques and reverse engineering (IA32/64, ARM)
- Experience with event correlation and incident reconstruction using log data
- Network traffic analysis skills to identify anomalous or malicious traits
- Database querying, systems architecture knowledge, and process automation for operational improvements
Sophos Compensation & Benefits Highlights
The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Sophos and has not been reviewed or approved by Sophos.
-
Leave & Time Off Breadth — Time away is positioned as broad, with company-wide wellness days plus dedicated learning days and paid volunteer time.
-
Parental & Family Support — Family-related leave appears more comprehensive than baseline offerings, including paid parental leave, caregiver leave, and extended bereavement leave.
-
Wellbeing & Lifestyle Benefits — Wellbeing support is emphasized through always-available assistance resources and a Calm subscription, suggesting a lifestyle-oriented benefits approach.
Sophos Insights
What We Do
Cybersecurity Evolved. As a worldwide leader in next-generation cybersecurity, Sophos protects nearly 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.







