Description
The opportunity:
The world is rapidly moving towards more efficient power distribution to support renewable, greener technologies. At Hitachi Energy, we are at the forefront of this revolution, delivering cutting-edge solutions to customers and countries across the globe. Our mission is not just a goal, but a passion that drives us every day.
However, our journey to a greener future faces the challenge of an increasingly complex and disruptive cybersecurity landscape. This is where you come in.
By joining our Cyber Defense Center (CDC) team as a Cybersecurity Incident Response Analyst, you will play a crucial role in protecting and advancing our mission. You will help safeguard our innovative work in renewable energy, ensuring our operations remain secure and uninterrupted.
As a member of our CDC team, you will support Security Monitoring services alongside our MSSP, assist in responding to cybersecurity incidents, and collaborate with expert Incident Managers during high-priority incidents.
You’ll work with a diverse, multicultural team across the globe, contributing to our 24/7 response capabilities throughout the year. In our modern, hybrid environment, you will gain exposure to a wide range of cybersecurity incidents, including IT, Cloud, OT/ICS, supply chain, and product security. You will also have the opportunity to work with the latest security tools, including next-generation AI-enabled platforms.
How you’ll make an impact:
-
Act as a second line of defense in our global Cyber Defense Center, identifying, analyzing, and containing advanced cyber threats in real time.
-
Lead the triage and technical investigation of complex incidents across IT, OT, Cloud, and product security environments.
-
Utilized advanced SIEM, EDR, SOAR, and threat intelligence platforms to detect and disrupt malicious activity with precision and speed.
-
Collaborate with global Incident Managers and Threat Hunters to accelerate containment and eradication strategies.
-
Apply forensic techniques to uncover attacker tactics, techniques, and procedures (TTPs)
-
Drive continuous improvement by designing and refining incident response playbooks, automation scripts, and detection rules.
-
Conduct post-incident reviews, producing high-quality reports that provide technical and strategic recommendations to executives and technical stakeholders alike.
-
Stay ahead of the threat landscape by proactively tracking nation-state actors, ransomware groups, and zero-day vulnerabilities.
-
Actively contributes to building a resilient security posture that protects critical infrastructure and accelerates our global mission for secure, sustainable energy.
-
Responsible for ensuring compliance with applicable external and internal regulations, procedures, and guidelines.
-
Living Hitachi Energy’s core values safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business.
Your background:
-
Bachelor’s or master’s degree in computer science, Cybersecurity, Information Security, or a related technical field. Advanced certifications are a strong plus.
-
At least two (2) years of experience in Security Operations, Incident Response, Threat Hunting, or Digital Forensics — ideally in a global enterprise or MSSP environment.
-
Proven expertise with SIEM (Sentinel, Elastic), EDR (CrowdStrike, Defender), and SOAR platforms.
-
Deep knowledge of network protocols, Windows/Linux/Cloud internals, and adversary TTPs (MITRE ATT&CK framework). Prior experience in an IT role is a strong plus.
-
Strong analytical and problem-solving skills, with attention to detail in investigating incidents.
-
Excellent command of spoken and written English, with the ability to communicate complex technical issues clearly to both technical and leadership audiences.
-
Passion for continuous learning, staying at the forefront of evolving cyber threats and defense strategies.
-
Ability to operate in high-pressure, global 24/7 incident response environments, including on-call rotations when required.
-
Commitment to integrity, collaboration, and excellence, with the ambition to be among the best in the cybersecurity profession.
-
Proficiency in both spoken & written English language is required.