What will you be doing in this role?
- Act as a first-line SOC analyst (approximately 60% of the time), working in a fast-paced and dynamic team environment where everyone, including management, contributes to L1 analysis.
- Collaborate with the team to develop and implement use cases and/or engineer new solutions and/or generate reports and/or perform other tasks as agreed upon with the consultant (approximately 40% of the time).
- Utilize our SOC techstack: Splunk, TheHive, and Tines as an automation platform.
- Stay up-to-date with emerging threats and technologies, applying this knowledge to improve our SOC operations and incident response capabilities.
Requirements
What will you be bringing to the team?
- Bachelor's degree in related field
and 6 years in IT
(3 years in Cybersecurity) or
Bachelor's degree in unrelated field and 10 years in IT
(with 5 years in Cybersecurity). - Mandatory certifications: Minimum one
certification in cybersecurity
and one in
incident response or computer/digital forensics
(
GCFA, GCFE, ECIH, OffSec IR-200
). - Experience with scripting and programming languages (e.g.,
PowerShell, Python, Ruby, Bash
) to automate tasks and develop custom testing scripts. - Expertise with
SIEM platform,
such as
Splunk,
for anomaly detection and threat hunting. - Strong knowledge of
Incident Response Platform,
like
TheHive,
for case management and collaboration. - Experience with
SOC automation
(eg.
Tines automation
). - Skilled with tools like
MISP
or
OpenCTI. - Experience with
EDR platform
(eg.
Bitdefender Gravity)
for endpoint security. - Understanding of
incident response and digital forensic
and especially in the field of
windows forensic
. - Proficiency in
English
language at
C1 level
.
Solliciteren