We are currently looking for an experienced Incident Responder / SOC Analyst to join our Cybersecurity Operations team. In this role, you will play a pivotal part in continuously monitoring and strengthening the organization's cyber defense posture, managing security incidents, and ensuring IT operational continuity during crises.
Your expertise will directly support the implementation of our Incident Response Plan, as well as regulatory compliance under frameworks such as NIS2 and GDPR.
Key responsibilities
- Incident response & coordination
- Contribute to the development, testing, and evolution of the organization's Incident Response Plan
- Define and refine investigation and remediation playbooks
- Threat detection & response
- Monitor security events (logs, SIEM alerts, etc.) and identify potential incidents
- Conduct in-depth triage, containment, eradication, and recovery actions
- Vulnerability management & simulation
- Evaluate and prioritize technical vulnerabilities
- Conduct incident simulation exercises and penetration testing activities
- Digital forensics & malware analysis
- Perform forensic investigations on hosts, endpoints, and network traffic
- Reverse-engineer malware and assess indicators of compromise (IoCs)
- Reporting & regulatory compliance
- Document incident response workflows and lessons learned
- Collaborate with CISO, Legal, and Compliance teams to align with NIS2, GDPR, and internal standards
- Continuous improvement
- Define and track relevant KPIs and SLAs to measure detection and response effectiveness
- Propose and implement enhancements to security tools, workflows, and readiness
Candidate profile
Education & experience
- Bachelor's degree (or equivalent) in Computer Science or a related field
- At least 13 years of hands-on experience in security incident response and SOC operations
Technical expertise
- Deep knowledge of Windows, Linux, cloud platforms, and network infrastructure
- Proven skills in forensics, malware analysis, log analysis, and penetration testing
- Familiarity with tools such as SIEM, EDR, vulnerability scanners, etc
- Proficient in scripting (Python, PowerShell, Bash)
Preferred certifications
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Reverse Engineering Malware (Grem)
Soft skills
- Calm and structured mindset in high-pressure situations
- Excellent verbal and written communication skills
- Strong analytical thinking and ability to translate complexity into clarity
- Team player with a collaborative and proactive approach
Interested?
Apply now and let's build a safer digital future together.