This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Security team is excited to welcome a motivated Cybersecurity Expert to help us protect an organization’s digital assets, systems, and data from security threats. As Cybersecurity Expert, you’ll play a vital role in operating and optimizing our Security Operations Center. You’ll have the opportunity to make a meaningful impact on both our products and processes. If you’re passionate about solving complex problems, collaborating across departments, and driving results, this role is perfect for you!
Job Responsibility:
Operate & optimize (and potentially Lead) a Security Operations Center (SOC)
Advanced Incident Investigation and Analysis
Handling Complex Threats: Investigating high-priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware
Deep-Dive Analysis: Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data
Cross-Source Correlation: Stitching together fragmented data from SIEM, EDR (Endpoint Detection and Response), and NDR (Network Detection and Response) tools to build a comprehensive picture of the attack
Proactive Threat Hunting and Detection Engineering
Threat Hunting: Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts
Rule Creation & Tuning: Developing custom detection logic and SIEM correlation rules to identify new malicious behavior
Reducing False Positives: Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents
Incident Response and Containment
Orchestrating Response: Acting as Security Incident Response Team (CSIRT) to isolate compromised assets and mitigate damage
Developing Playbooks: Creating and updating security playbooks and automated workflows within SOAR platforms to standardize incident response
Forensic Evidence Preservation: Ensuring digital evidence is collected and preserved according to legal and chain-of-custody standards
Mentorship and Leadership
Guidance for other members of the team: In the future, mentoring and training Tier 1 and Tier 2 analysts on complex investigations and new technologies
Quality Assurance: Performing ticket reviews and providing feedback to ensure high-quality documentation and adherence to Service Level Agreements (SLAs)
Strategy, Compliance, and Reporting
Vulnerability Assessment: Analyzing vulnerability scan results to identify critical weaknesses and recommending remediation plans
Reporting and Compliance: Generating reports on incidents, trends, and SOC performance for management, and auditing systems for compliance (e.g., ISO 27K1, PCI DSS, HIPAA)
Threat Intelligence Integration: Incorporating external threat intel feeds to anticipate emerging threats and update defenses
Requirements:
Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
Knowledge of Security frameworks such as ISO 27001, NIST, PCI-DSS, OWASP, GDPR
Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
Deep Knowledge of cybersecurity/technical concepts such as: GNU/Linux systems
Microsoft Sentinel and Defender, as well as experience with writing KQL queries
Microsoft Azure (Network Security Groups, Recovery Services Vaults, Playbooks and Workbooks)
TCP/IP, DNS, and firewalls
Python, Bash, and SQL, Java, PHP
Familiarity with attack and exploitation techniques involving operating systems, applications, and devices (CISSP, CompTIA, CEH)
Understanding of security best practices for data and systems protection
Ability to evaluate, track, and manage information security threats and vulnerabilities based on available information
Understanding and ability to perform penetration testing on applications and identify attack vectors
Strong analytical and problem-solving skills
Effective communication skills to collaborate with cross-functional teams
Ability to report and create KPIs for the Security Department
Familiarity with ticketing tools such as Jira
Stay current: on the latest cybersecurity trends, threats, and new security technologies
Nice to have:
Datadog knowledge is a plus
Familiarity with vulnerability scanning tools such as SonarQube, AWS Inspector, Qualys, Nessus, others is a plus
Relevant certifications, such as CompTIA Security+, Microsoft Defender Certificate, Microsoft Sentinel Certificate, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or others is a plus
What we offer:
Flexible career path with personalized internal training and an annual budget for external learning opportunities