Tech Stack
AWSAzureCloudCyber SecurityGoogle Cloud Platform
About the role
- Coordinating and executing the response to security incidents, including containment, eradication, and support in recovery efforts
- Conduct digital forensics investigations to analyze compromised systems, gather evidence, and identify the scope and impact of security incident
- Correlate logs, alerts, and IOCs to identify root causes and attack paths
- Create detailed incident reports and executive summaries and Conduct lessons-learned sessions and recommend preventive measures
- Maintain detailed records of incident response activities, findings, and lessons learned to support post-incident reviews and reporting
- Work closely with other members of the SOC/CERT team and cross-functional teams to ensure a comprehensive approach to incident management
- Monitoring security alerts and events to identify potential incidents and escalate them as necessary
- Contribute to the development and refinement of incident response processes, tools, and techniques based on experience and emerging threats
Requirements
- Bachelor’s/Master’s in Cybersecurity, Computer Science, or related field
- 6+ years in cybersecurity, ideally as Security Incident Responder
- Proficiency in digital forensics tools and techniques (e.g. EZ Tools, Velociraptor, Autopsy)
- Hands-on knowledge of SIEM, and security analytics tools (e.g. Microsoft Sentinel, Microsoft Defender XDR, Elastic SIEM)
- Experience in security incident handling, digital forensics, or a related role
- English is a must, German and French are a plus
- Understanding of cybersecurity frameworks and standards (e.g. ISO27001, NIST, GDPR)
- Strong analytical and problem-solving skills
- Following certificates are a plus: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), Cloud certifications (AWS, Azure, or GCP)