This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Conduct in-depth analysis of security alerts and incidents escalated from L1
Utilize advanced threat intelligence and hunting techniques to identify and investigate sophisticated threats
Perform malware analysis and reverse engineering techniques
Investigate and analyze network traffic for malicious activity
Develop, maintain, and enrich threat intelligence feeds, indicators of compromise (IOCs), and other relevant threat-related data
Lead and coordinate incident response activities, including containment, eradication, recovery, and root cause analysis
Develop and implement security playbooks and response procedures
Collaborate with other IT teams to remediate security vulnerabilities and implement security controls
Conduct in-depth digital forensic investigations on compromised systems and networks
Collect, preserve, and analyze digital evidence according to legal and industry best practices
Utilize forensic tools and techniques such as disk imaging, memory dumps, network traffic analysis, and malware analysis
Reconstruct the timeline of events related to security incidents
Prepare forensic reports for legal and internal purposes
Contribute to the development and improvement of security monitoring and detection capabilities
Assist in the tuning and optimization of security tools and technologies
Provide guidance and mentoring to junior analysts on threat hunting techniques
Prepare detailed incident reports and post-mortem analysis
Service Utilization Monitoring & Reporting the service consumption and costs
Generate reports on security trends, threat activity, and the effectiveness of security controls
Maintain accurate and up-to-date documentation of security procedures and processes
Requirements:
Bachelor’s degree in Computer Science, Information Technology, or related field
CCNA/CCNP security, Certified Forensic Computer Examiner (CFCE), Certified Information Systems Security Professional (CISSP) with a focus on digital forensics, or other relevant advanced security certifications highly preferred
3+ years of experience in SOC Analyst role
Strong understanding of computer operating systems (Windows, Linux, macOS)
Experience with digital forensics and analysis tools and software (e.g., EnCase, FTK, Cellebrite)
Experience in advanced threat hunting, and incident response
Knowledge of common attack vectors (e.g., phishing, malware, ransomware)
Understanding of threat intelligence feeds and data sources
Experience with security orchestration and automation platforms (SOAR)