Senior Threat Researcher Detection Engineer
Sophos
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About Sophos
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.
Role Summary
We are seeking a detail-oriented and technically skilled Senior Threat Researcher Detection Engineer to join our X-OPS team. In this role, you will be responsible for analyzing advanced security threats—ranging from malware to complex web attacks—and translating threat intelligence into high-fidelity detections across our platform. Your work will help ensure our analysts and clients receive highly accurate, actionable alerts with minimal noise.
You will leverage data from over 40 third-party and internal sources, partner with our CTU Threat Intelligence team, and use a range of scripting and automation tools to strengthen detection capabilities. The ideal candidate is a hands-on security practitioner with a deep understanding of endpoint behavior, malware analysis, and detection development who thrives in fast-paced, technical environments.
What You Will Do
- Develop countermeasures to detect advanced threats based on research and intelligence from the CTU team.
- Analyze endpoint behaviors and logs to design detections using multi-source telemetry.
- Continuously refine and monitor detection rules to optimize the signal-to-noise ratio for alerts.
- Research and implement alert handling for new device ingestions, ensuring high-value signal delivery.
- Leverage internal tooling to distinguish native from standard integrations for detection accuracy.
- Collaborate on the development of internal tools, automation, and detection infrastructure.
- Act as a subject matter expert across departments including Product Management, Marketing, and Labs Research.
What You Will Bring
- Strong passion for cybersecurity research and the ability to quickly learn emerging technologies.
- Hands-on experience in scripting languages (PowerShell, Bash, Python) and use of Python data science libraries (e.g., NumPy, Pandas, Matplotlib).
- Knowledge of CI/CD pipelines, testing frameworks, and automation principles.
- Proficiency in analyzing logs from firewalls, proxies, and security infrastructure to identify anomalies.
- Familiarity with event logs, traffic pattern anomalies, and threat hunting methodologies.
- Strong understanding of endpoint detection, Linux/Unix and Windows OS internals, vulnerability identification, and workflow automation.
- Experience with event correlation and incident reconstruction using log data is a plus.
- Network traffic analysis skills, including identification of anomalous or malicious traits is a plus.
- Solid grasp of database querying, systems architecture, and process automation for operational improvements is a nice to have.
Desirable:
- Strong experience with XDR.
Nice to have:
- Experience in malware analysis, including static/dynamic techniques and reverse engineering (IA32/64, ARM binaries).
- Forensic analysis of memory and disk images across various OS and file system types.
Ready to Join Us?
At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply.
What's Great About Sophos?
Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. While we are a remote first organization, applicants must have legal authorization to work in the jurisdiction where the position is posted, without requiring employer sponsorship. Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit Employee-led diversity and inclusion networks that build community and provide education and advocacy Annual charity and fundraising initiatives and volunteer days for employees to support local communities Global employee sustainability initiatives to reduce our environmental footprint Global fitness and trivia competitions to keep our bodies and minds sharp Global wellbeing days for employees to relax and recharge Monthly wellbeing webinars and training to support employee health and wellbeing
Our Commitment To You
We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Key skills/competency
- Threat Detection
- Malware Analysis
- Endpoint Security
- Scripting (Python, PowerShell, Bash)
- Cybersecurity Research
- Threat Intelligence
- XDR (Extended Detection and Response)
- CI/CD Pipelines
- Log Analysis
- Automation
How to Get Hired at Sophos
- Research Sophos's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume: Highlight detection engineering, threat research, Python, XDR, and endpoint security experience.
- Showcase technical prowess: Emphasize hands-on experience in scripting, malware analysis, and log data correlation.
- Prepare for behavioral questions: Focus on problem-solving, collaboration, and passion for emerging cybersecurity threats.
- Demonstrate domain expertise: Discuss understanding of Windows/Linux internals and threat hunting methodologies.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background