Incident Response & Threat Intelligence Lead
About Us
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.
Role Summary
インシデント対応および脅威インテリジェンスのリーダーは、日々高度化するセキュリティ脅威への対応において、お客様を支援します。インシデント発生時の対応を支援するだけでなく、効果的なインシデント対応に向けた事前準備も支援します。小規模なインシデントから複雑で大規模インシデントまで、技術的な調査を実施し、攻撃者の行動に基づいてインシデントの根本原因と範囲を特定し、推奨される対応戦略を提供することでお客様を支援します。
さらに、この役割はソフォスの脅威対策ユニット(CTU)との主要な連絡窓口として、調査結果に攻撃者の戦術、技術、インフラに関する最新のインテリジェンスを反映させます。また、運用上の知見を、お客様や社内チーム向けの実行可能なガイダンスに変換する役割も担います。
リーダーは技術レベルおよび経営層向けの質の高いプレゼンテーションやブリーフィングを行う責任も担います。これには、調査結果の提示、脅威インテリジェンスの動向の説明、多様な聴衆に対して対応策の推奨事項を明確に伝達し、情報に基づいた意思決定を支援することが含まれます。
Incident Response & Threat Intelligence Leads support clients in managing increasingly sophisticated security threats daily. They not only assist in responding to incidents as they occur but also help clients prepare in advance for effective incident response. Whether handling small‑scale or complex, large‑scale incidents, we assist clients by conducting technical investigations, identifying the root cause and scope of the incident based on attacker behavior, and providing recommended response strategies.
In addition, this role will act as a key liaison with the Sophos Counter Threat Unit, ensuring investigative findings are enriched with the latest intelligence on attacker tactics, techniques, and infrastructure. The role also translates operational intelligence into actionable guidance for clients and internal teams.
Leads are also responsible for delivering high‑quality presentations and briefings, both technical and executive‑level. This includes presenting investigation findings, explaining threat intelligence trends, and clearly communicating response recommendations to diverse audiences to support informed decision‑making.
What You Will Do
担当案件を主導し、顧客のサイバーインシデントの調査、封じ込め、対応を行い、困難でストレスの高い状況にある顧客を支援する。場合によっては、通常とは異なる勤務時間となることもあります。
Windows、Mac、Linux/Unix プラットフォームを含む複数のプラットフォームにおいて、インシデント対応調査、封じ込め、根本原因分析活動を実施する。
ソフォスツールを活用して大規模な調査を行い、エンドポイントおよびネットワーク上の証拠を検証する。
顧客案件全体を統括し、顧客の上級ステークホルダーとのコミュニケーションを主導する。
インシデント対応の一環として、他の社内チームと連携し、優先順位を設定する。
顧客対応における状況や懸念事項について、ソフォスの上級管理職に効果的に報告する。
顧客のステークホルダーに対し、質の高い文書および口頭での報告、提言、調査結果を提示する。
攻撃者のTTP(戦術、技術、手順)を特定・体系化し、現在および将来の調査やツールの改善に役立てる。
SophosLabs、セキュリティチーム、ITチームと連携し、セキュリティインシデントに対応するための是正措置計画を実施する。
最新のサイバーセキュリティツールと脅威の動向を常に把握し、顧客に適切なアドバイスを提供する。
社内の脅威インテリジェンスチームとの主要な連絡窓口となり、攻撃者の戦術、手法、インフラに関する最新情報を調査や顧客向け成果物に反映させ、対応戦略を強化する。
複雑な脅威インテリジェンスを、顧客にとって明確かつ実用的な知見へと変換し、傾向、攻撃者の行動、想定される攻撃シナリオを提示することで、意思決定を支援し、顧客の全体的なセキュリティ体制を向上させる。
Lead assigned engagements to investigate, contain and respond to customers’ cyber incidents, helping them through difficult and stressful times, which may involve non-traditional working hours.
Perform incident response investigations, containment and root cause analysis activities across multiple platforms including Windows, Mac, Linux/Unix platforms.
Utilise Sophos tools to conduct large-scale investigations and examine endpoint and network-based evidence
Own the customer engagement including leading communications with the customer’s senior stakeholders
Liaise with other internal teams to set priorities as part of the incident response.
Effectively report on the status and any points of concern within customer engagements to senior management within Sophos.
Produce high-quality written and verbal communications, recommendations, and findings to customer stakeholders.
Recognise and codify attacker TTPs to enhance current and future investigations and tooling.
Work with SophosLabs, security and IT teams to implement remediation plans in response to security incidents.
Maintain awareness of current cyber security tools and threat landscape in order to advise customers appropriately.
Serve as the primary liaison with internal threat intelligence teams, integrating timely intelligence on attacker tactics, techniques, and infrastructure into investigations and client deliverables to strengthen response strategies.
Translate complex threat intelligence into clear, actionable insights for clients, presenting trends, adversary behaviours, and likely attack scenarios in a way that supports decision‑making and improves clients’ overall security posture.
What You Will Bring
日本語に堪能であること。
週末、休日、祝日を含む通常の業務時間外でも、クライアントのインシデント対応に柔軟に対応できること。
組織において体系的にインシデント対応調査を主導し、顧客環境に影響を与える標的型脅威の調査を行った経験が5年以上あること。
Encase、FTK、X-Ways、CYLR、Autopsy、Magnet Forensics、または1つ以上のオープンソースフォレンジックツールの使用経験。
Microsoft 365環境におけるフォレンジック調査の実施経験。
セキュリティ脅威、脆弱性、および「Living off the Land」手法に関する深い理解。
チーム環境においても、個人としてもすぐれたパフォーマンスを発揮できること。
困難な状況下でも強力なリーダーシップを発揮し、常にプロフェッショナルで冷静かつ専門的な態度を維持できること。
チームメンバーそれぞれの強みとスキルを活かし、インシデント対応を成功に導く能力。
現代の脅威、TTP(戦術・技術・手順)、およびMITRE ATT&CKマトリックスに関する高度な技術的理解。
優れたレポート作成能力およびコミュニケーション能力。
【応募要件 - 歓迎(WANT)】
英語に堪能であること。
ソフォスのセキュリティソリューションおよびその他の定評のあるEDRソリューションの使用経験。
AWS環境におけるフォレンジック調査の実務経験。
業界を問わず、規模や地理的条件の異なる組織へのサポート経験。
脅威ハンティングの実務経験。
Windows、Mac、Linuxベースのオペレーティングシステムの管理およびサポート経験。
OSQuery(またはSQL)に関する知識。
GCIH、GCFA、GCFEのいずれかの資格を少なくとも1つ保有していること。高度な情報セキュリティ認定資格は必須ではないが、あれば尚可。
セキュリティインシデントの根本原因の特定とセキュリティ体制改善のための推奨事項の提示による解決能力。
業界でのプレゼンテーション、ブログ、メディア記事などを通じた思想的リーダーシップを発揮した実績。
Proficiency in the Japanese language.
Open to work outside of standard business hours including weekends, on call rotations and holidays to respond to our clients incidents.
5+ years of experience leading incident response investigations in a methodical manner for organisations and investigating targeted threats impacting customer environments
Experience with Encase, FTK, X-Ways, CYLR, Autopsy, Magnet Forensics or one or more open-source forensic tool(s).
Experience conducting forensics in Microsoft 365 environments.
Deep understanding of security threats, vulnerabilities and ‘Living off the Land’ techniques.
Able to thrive within a team environment as well as on an individual basis.
Demonstrate strong leadership in challenging environments, maintaining a professional, calm, and expert manner at all times.
Ability to use individual team members’ strengths and skills to successfully lead an incident response.
Good technical understanding of modern threats, TTPs, and the MITRE ATT&CK Matrix.
Strong report-writing and communication skills.
Desirable
Fluent in English language.
Experience with Sophos security solutions and other recognised EDR solutions.
Experience conducting forensics in AWS environments.
Experience of supporting organisations of different sizes and geographical locations, across industries.
Threat hunting experience.
Experience administering and supporting Windows, Mac and Linux based operating systems
Understanding of OSQuery (or SQL).
At least one certification in GCIH, GCFA, GCFE. Advanced Information Security certifications preferred but not required.
Resolution of security incidents by identifying root cause and security posture improvement recommendations.
Demonstrated thought leadership through industry presentations, blogs, media articles, etc.
#B2
#LI-Remote
Ready to Join Us?
At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply.
What's Great About Sophos?
· Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. While we are a remote first organization, applicants must have legal authorization to work in the jurisdiction where the position is posted, without requiring employer sponsorship.
· Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit
· Employee-led diversity and inclusion networks that build community and provide education and advocacy
· Annual charity and fundraising initiatives and volunteer days for employees to support local communities
· Global employee sustainability initiatives to reduce our environmental footprint
· Global fitness and trivia competitions to keep our bodies and minds sharp
· Global wellbeing days for employees to relax and recharge
· Monthly wellbeing webinars and training to support employee health and wellbeing
Our Commitment To You
We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos