Security Incident Responder in a leading IT service company in Germany, responsible for analyzing and responding to IT security incidents while developing technological solutions.
Responsibilities
Analysis & Response: You are responsible for professionally handling IT security incidents for our clients — in a structured, solution-focused manner and with a calm mindset.
Digital Forensics: You perform forensic investigations on clients and servers, identify traces of attacks, and support your team with the technical analysis — in larger incidents you will also take on coordination responsibilities.
Technological Development: You actively contribute to the automation and further development of our DFIR infrastructure (Digital Forensics & Incident Response).
Staying Informed: You keep up to date with current trends, threats, and tools in cybersecurity.
Learning & Development: Through targeted training you continuously expand your professional and technical skills — in IT security there is always more to learn.
Requirements
Experience in IT Security & DFIR: You have solid professional experience in this field and are familiar with Digital Forensics & Incident Response.
Proficient with forensics tools: You analyze security incidents in a targeted and methodical way.
Travel & on-call availability: You are flexible and ready to respond quickly in case of emergencies.
Broad IT knowledge: You bring sound know-how in standard IT technologies.
Team player & analytical: You think in a solution-oriented way and enjoy working in a team.
Communicative & professional: You present yourself confidently — in both German and English.
Benefits
Individual onboarding with a personal mentor
No two days are the same: challenging, varied, autonomous — but never boring
Flat hierarchies — no bureaucratic red tape. Say it directly.
The flexibility you need: hybrid work, flexible hours, additional vacation days — we live this reality.
Modern, well-equipped offices: height-adjustable desks, two monitors, quiet zones and open-plan areas — whatever suits you.
Company bike (JobRad) & team spirit: whether road bike or e-bike — we help you get your new ride. And yes, we celebrate sports together (including sponsorship!).
Retirement provision with employer contributions.
Corporate benefits offering discounts and experiences.
CISO managing information security and privacy governance at Puzzel, a leading cloud - based contact center provider in Europe. Engaging with stakeholders for compliance and risk management.
Manager of IT Support & Endpoint Security overseeing service desk operations and endpoint security strategies. Leading a team to deliver high - quality technical support and manage IT security policies.
Senior Security Officer responsible for security and safety duties in acute care settings. Providing armed presence and response, coordinating with law enforcement as required.
Security Officer overseeing sensitive information protection and compliance with regulations. Collaborating with internal teams ensure security policy implementation and risk management under EU standards.
Technical consultant addressing information security risks for USAA and guiding strategic security direction. Leading peers in assessing security strategies and educating on best practices.
Technical Recruiter for BGS managing recruitment of Cybersecurity and IT professionals. Collaborating with technical teams to identify skill requirements and enhance talent acquisition processes.
Security and Privacy SME at Dynanet Corporation responsible for data management compliance and governance guardrails. Ensuring secure data handling and adherence to federal regulations.
PAM Manager responsible for strategy, roadmap, and operations of PAM program at Intact. Leading a team to safeguard privileged identities and secrets across various environments.
Senior Cybersecurity Vulnerability Management Versatilist at Boeing. Protecting the IT ecosystem by innovating vulnerability management solutions and leading security initiatives.
Entry level Associate Security Engineer at Navy Federal securing technical infrastructure and workloads with operational capabilities and threat monitoring practices.