Cybersecurity Incident Response Analyst

Overview

Our client, a prominent ICT provider, is seeking a Level 2 Security Analyst to join their Security Operations Center (SOC). This role focuses on detecting, identifying, analyzing, and handling IT security incidents across managed client systems and infrastructure.

The Level 2 Security Analyst will support the SOC team at all levels of incident handling, assisting in cybersecurity investigations and contributing to the development and enhancement of security monitoring services and associated processes.

The SOC team is currently expanding and includes analysts at various expertise levels, such as security monitoring specialists and forensic investigators, led by the SOC head.

No. of Vacancies
1
Specific Skills

Technical Skills:

  1. SIEM and IDS Proficiency: Experience with Security Information and Event Management (SIEM) tools (e.g., Splunk, QRadar, ArcSight) and Intrusion Detection Systems (IDS) to monitor, analyze, and respond to security events.
  2. Incident Response: Strong knowledge of incident detection, analysis, and response processes, including experience managing complex security incidents.
  3. Threat Intelligence and Analysis: Ability to identify, assess, and respond to emerging threats, with a good grasp of threat hunting techniques.
  4. Vulnerability Assessment: Experience conducting vulnerability scans (e.g., using tools like Nessus, Qualys) and analyzing findings for impact and resolution.
  5. Endpoint Security: Familiarity with endpoint protection platforms (EPP) and endpoint detection and response (EDR) tools.
  6. Network Security Fundamentals: Solid understanding of network protocols, firewall configurations, VPNs, and network-based attacks.
  7. Scripting and Automation: Proficiency in scripting languages (e.g., Python, PowerShell, Bash) to automate tasks and improve SOC workflows.
  8. Forensics (Optional but Valuable): Knowledge of digital forensic tools and processes to support incident investigations and post-incident analysis.

Soft Skills:

  1. Analytical Thinking: Strong critical thinking skills to analyze security incidents, identify root causes, and recommend effective responses.
  2. Communication Skills: Clear and concise communication for incident reporting, collaboration with team members, and advising management on risks and security measures.
  3. Collaboration and Teamwork: Ability to work closely with various internal departments and third-party teams to coordinate incident response and security improvements.
  4. Attention to Detail: Precision in monitoring security logs, handling incidents, and documenting findings to avoid oversight in critical security areas.
Responsible For

Primary Responsibilities:

  • Security Event Monitoring and Analysis: Use SIEM, IDS, and endpoint security systems to monitor and analyze security events.
  • Incident Analysis and Resolution: Investigate and respond to security alerts and incidents.
  • Collaboration with Response Teams: Work closely with various internal support teams, managing open cases and tracking changes.
  • Threat Identification and Analysis: Identify and evaluate potential threats.
  • Procedure Development for Level 1 Analysts: Develop and share work instructions for Level 1 Security Analysts.
Job Nature
Full Time
Educational Requirements

Degree Requirements:

  • Bachelor’s Degree in a relevant field, such as Computer Science, Cybersecurity, Information Technology, or Information Security.
  • Alternatively, a related technical degree (e.g., in Network Security or Information Systems) or equivalent experience in cybersecurity roles.

Experience Requirements
Entry
Job Location
rotterdam, The Netherlands
Salary
TBD
Job Level
Junior to Mid Postion.

How to Apply

 

Interested candidates can send their resumes to contact@novanetwork.nl mentioning "Job Title" in the subject line.

Apply Online

Apply for this position

*
*
* Attach your resume. Max size 2mb Allowed Type(s): pdf
×