This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Engineer II, Cyber Incident Response, is a mid-level technical role within the Security Operations Center (SOC) responsible for detecting, investigating, and responding to cybersecurity incidents. This role performs in-depth analysis of alerts, escalates complex cases, and contributes to the improvement of response processes and playbooks. The Engineer II will collaborate with global cyber defense teams to contain threats, minimize business impact, and strengthen detection capabilities. This position requires strong analytical skills, hands-on technical expertise, and the ability to operate effectively in a fast-paced environment.
Job Responsibility:
Investigate and respond to cybersecurity incidents, including phishing, malware, ransomware, and unauthorized access attempts
Perform analysis of logs, alerts, and forensic data to determine the scope and impact of incidents
Escalate complex or high-severity incidents to Engineer III, Lead, or Principal staff, providing clear documentation and evidence
Assist in containment, eradication, and recovery activities during incident response
Contribute to the development and maintenance of SOC playbooks, runbooks, and standard operating procedures
Collaborate with threat intelligence, vulnerability management, and forensics teams to strengthen detection and response strategies
Participate in lessons-learned sessions and recommend improvements to SOC processes and tooling
Support junior analysts (Engineer I) by sharing knowledge and providing guidance on investigative techniques
Requirements:
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent work experience
Strong knowledge of cybersecurity fundamentals, incident response methodology, and adversary tactics
Familiarity with industry frameworks such as NIST, MITRE ATT&CK, and ISO 27035
2–5 years of progressive experience in cybersecurity, with at least 2 years in SOC operations or incident response
Hands-on experience with SIEM, EDR, and forensic tools (e.g., Splunk, CrowdStrike, Wireshark)
Demonstrated ability to analyze logs, alerts, and artifacts to support incident investigations
Strong written and verbal communication skills for documenting findings and briefing stakeholders
Nice to have:
GIAC Certified Incident Handler (GCIH)
GIAC Certified Intrusion Analyst (GCIA)
CompTIA Security+ or CySA+
Certified Ethical Hacker (CEH)
What we offer:
medical
dental
vision care
comprehensive suite of benefits focusing on physical, emotional, financial, and social wellness
support for working families
backup dependent care
adoption assistance
infertility coverage
family building support
behavioral health solutions
paid parental leave
paid caregiver leave
training programs
professional development resources
opportunities to participate in mentorship programs