Type:
Permanent employment
Location:
Amsterdam
Education:
Associate degree (EQF 5)
Published:
04/10/2021
Status:
Open
Apply before:
25/11/2021
Hours p/wk:
40

Description:

About the role:

You will be required to play an important part in expanding our activities across eu market.

As a cert/soc analyst you will be responsible for prompt response to security threats and cyber incidents as well as liaising with customers. Using your professional expertise, you will be expected to generate contacts and collaboration among other certs. 

 

Tasks to solve:

  • Respond to various threats, including blocking of phishing websites and resources that distribute malware.
  • Perform cyber incident analysis to include determining scope, urgency, potential impact and identify the specific vulnerability.
  • Provide targeted attack detection.
  • Develop custom signatures and analytics for the identification of targeted attacks.
  • Work with and communicate effectively to all customers and stakeholders.
  • Develop comprehensive and accurate reports based on common work with customers.
  • Provide detailed remediation guidance on protection of the source or initial point of access of intrusion.
  • Provide consultations to customers’ employees on threats targeting their networks.
  • Conduct training sessions for partners.
  • Set up and develop collaboration with first, trusted introducer, and other cert communities to share information about threats effectively and quickly.
  • Participate in the testing and development of the company’s products.
  • Interact with all of the company’s departments in all of its offices.
  • Speak at universities and specialized local and international conferences.

 

Apply for this vacancy if you have the following qualifications:

  • Industry-specific education (degree in information security, computer science, security studies, intelligence studies, cybersecurity, etc.).
  • Experience in working with third-party certs and soc teams, both private and public.
  • Experience working with analysis techniques, identifying indicators of compromise, threat hunting, identification of intrusions and potential incidents.
  • Experience with siem and soar systems as well as sandbox, ids/ips, and edr solutions.
  • Experience in forensic investigation with malware analysis skills.
  • Knowledge of applicable legislation, including gdpr.
  • Field-specific certification (such as sscp, cissp, cism, ceh) will be an advantage.

 

Send your cv to job@group-ib.com

FaLang translation system by Faboba