Implement and maintain security controls across networks, systems, and applications
Monitor security infrastructure and investigate security incidents in cooperation with our Managed Detection and Response provider
Utilize Microsoft Sentinel as well as other technologies from Microsoft, Darktrace, etc. to perform advanced threat hunting, detection, and response activities
Provide recommendations for improving the security posture with our Security Orchestration, Automation, and Response (SOAR) developers and platform specialist
Requirements
Bachelor’s degree in computer science, Information Technology, or a related field (or equivalent experience)
Great interest for and commitment to IT security operations, including incident response, vulnerability management, and security monitoring
Proficiency in Microsoft technologies (e.g., Active Directory, Windows Server, Azure) and Cisco networking technologies
Practical experience with SIEM query languages like Kusto, SPL, Elasticsearch Query language or similar
Scripting capabilities in high level languages like Python or Powershell
Good problem-solving and analytical skills with attention to detail
Familiarity with industry standards and frameworks (e.g., NIST, ISO 27001, CIS Controls)
Benefits
A job in a growing, international company with good career opportunities
State of the art technology and work in an exciting industry
Good work life balance with flexible working conditions
A culture of teamwork, based on knowledge sharing, professional respect, kindness
Trainings, conferences, and the opportunity for self-development
Hybrid workplace
Great benefits scheme
Be a part of fast-growing global business that offers best in class hearing care to millions of people worldwide
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.
Intern role in Product Security Operations for Salesforce, leading innovative AI - driven security tools and initiatives. Collaborate with experts to enhance security governance and risk management processes.
Security Operations Manager leading colleague safety and security programs at CVS Health. Responsible for managing security risks and operational performance in retail environments.