This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Lead or participate in computer security incident response activities for moderately complex events
Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies
Provide security consulting on medium projects for internal clients to ensure conformity with corporate information, security policy, and standards
Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security
Review and correlate security logs
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity
Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives
Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals
Conduct forensic analysis of cyber incidents including hacking, malware attacks, data breaches and insider threats
Identify, preserve, extract and analyze digital evidence from computers, mobile devices, servers, cloud systems, and other digital storage media
Use industry-standard forensic tools and techniques (e.g., FTK, EnCase, X-Ways, Autopsy, Volatility, Cellebrite, Volatility, KAPE, CrowdStrike, Microsoft Defender for Endpoint, Splunk, Elastic, or similar platforms) to uncover evidence and trace cyber attackers
Lead and execute advanced digital forensic investigations involving endpoint, cloud, network, mobile, email, and SaaS platforms to determine root cause, impact, data exposure, and attacker methodology
Serve as Incident Commander during major security events, coordinating cross‑functional technical teams, legal, compliance, risk, and executive leadership to drive timely containment and eradication actions
Conduct threat hunting activities leveraging SIEM, EDR, network telemetry, and intelligence sources to proactively identify indicators of compromise (IOCs), anomalous behaviors, and emerging threats targeting the financial sector
Develop and maintain incident response playbooks and standard operating procedures, ensuring alignment with regulatory requirements, industry frameworks, and evolving threat landscapes
Requirements:
4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
at least 6 years of focused professional experience in DFIR, threat hunting, and digital forensics within highly regulated industries (financial services preferred) or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
Proven experience leading complex, multi‑team, enterprise‑wide programs in highly regulated organizations
Strong knowledge of digital forensics and incident response principles, tooling, and frameworks (e.g., case management systems, SOAR, log pipelines, forensics investigations, event triage)
Familiarity with SOC and IR functions, threat intelligence, detection engineering, and crisis management
Proficiency with program and project management tools and frameworks (e.g., JIRA, Confluence, Smartsheet, MS Project, SAFe, Agile, Waterfall/Hybrid)
Exceptional communication skills, including executive‑level reporting, stakeholder engagement, and risk management
Ability to operate effectively across highly technical and non‑technical domains, balancing operational needs with engineering constraints and business priorities