Cybersecurity Analyst

SOC Reading, United Kingdom

Req ID: 26-324

Come Join Our Passionate Team! At Barracuda, we make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organizations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level.
 
We know a diverse workforce adds to our collective value and strength as an organization. Barracuda Networks is proud to be an employer that complies with all applicable national, state and local laws pertaining to nondiscrimination and equal opportunity regardless of race, gender, religion, sex, sexual orientation, national origin, or disability.
Envision yourself at Barracuda:
 
What you’ll be working on:
The Cybersecurity Analyst will support the timely delivery of Barracuda XDR services for our customer base. This includes security alarm analysis, troubleshooting and resolution of security incidents, and customer management. The cybersecurity analyst works among a skilled global SOC team to address security matters across Barracuda XDR customer base. This role supports 24x7x365 operations, including evening, weekend, and holiday shifts.
  • Perform daily operation of monitoring networks for security events/incidents to detect active threats, intrusions, and/or compromises. 
  • Respond to security alarms and analyze and escalate incidents by process or management. 
  • Engage on incident management and response efforts. 
  • Manage vulnerability scanning processes.
  • Management of Endpoint Protection and Email Protection services. 
  • Tier one support of SIEM engineering. 
  • First line of operational support for requests with Barracuda XDR’s security services. 
  • Support general inquiries/requests relevant to security concerns and recommendations. 
  • Responsible for understanding the ever-changing global threat landscape and tracking changes in this area, as well as understanding the direct or indirect impact to the customer base by publishing threat advisories on a regular basis. 
  • Engage in proactive security efforts by conducting threat hunting, attack and defend exercises, threat (malware, vulnerability) research, etc. 
  • Continuously advance our SOC maturity through participation in our agile projects. 
  • Perform customer management by understanding, identifying, and mitigating issues with customers security.
What you bring to the role:  
  • Excellent verbal and written communication skills 
  • Experience troubleshooting in a technical environment, 
  • Analytical thinking and problem-solving skills. 
  • Customer service skills, phone and remote support experience. 
  • Ability to work evening, weekend, and holiday shifts. 
  • Must be a quick learner. 
  • Proficiency with ticketing systems. 
  • Working knowledge of Windows, Linux, Mac operating systems.
  • Experience with basic networking principles. 
  • Experience with incident response and analysis of attack vectors such as: 
    • Ransomware 
    • Business Email Compromise 
    • Phishing 
    • Botnet 
    • DDoS 
    • SQL Injection 
    • Supply Chain Attacks 
    • Mobile Threats 
  • Experience with common SOC tools such as: 
    • SIEM 
    • SOAR 
    • Other Log/Packet Analysis applications 
    • EDR 
    • Email Security 
    • Threat Intelligence 
    • Vulnerability Scanner 
    • Sandbox Environments 
  • Knowledge with cloud computing 
  • Programming skills preferred 
 
Core skills and competencies
  • Incident analysis – proficient using common monitoring tools like SIEM to investigate log data and identify attack patterns and malicious behaviors which could indicate a present threat.
  • Threat research – manage emerging threats by researching new vulnerabilities, attack tactics and techniques, malware variants, etc. to collect threat intel, conduct threat hunting, and publish threat advisories.
  • Security systems administrator – understand best practices to configure and manage policy settings, allow-lists, block-lists, and fine tuning of features and controls of advanced security technologies such as EDR, email gateway defense, and vulnerability scanners.
  • Cyber knowledge and expertise – understanding and following of best practices and common industry frameworks and compliance requirements in order to provide guidance, recommendations, and general expertise to XDR customers.
  • Soft skills – strong communication skills to interface with IT professionals and even executives within customer organizations. Problem solving skills to troubleshoot and resolve problems. Critical thinking skills to understand complex attacks. Continuous learning mindset to keep up with the evolving threat landscape.
 
What you’ll get from us:
A team where you can voice your opinion, make an impact, and where you and your experiences are valued. Internal mobility – there are opportunities for cross training and the ability to attain your next career step within Barracuda. In addition, you will receive equity, in the form of non-qualifying options.
 
#LI-Hybrid