Job Description
Responsibilities
- Perform initial triage of security alert triggered by SIEM solution in accordance with the steps defined in Use Case-based documented runbooks
- Properly document investigations and triage outcomes in the corresponding ticketing tool, maintaining detailed records of stakeholder communication
- If required and in accordance with the investigation steps detailed in runbooks, escalate the alerts to the SOC Incident manager in line with pre-defined alert priority and corresponding SLAs.
- Work as part of a 24/7 operation (3-shift pattern), following required handover procedures to ensure seamless service continuity during shift changes.
- In-office presence is strictly required due to the criticality of assignments and the sensitivity of data handled.
- Ensure adherence with DBG line of conduct, quality standards and corporate values.
Requirements
- University degree in Computer Science or similar.
- Previous experience in a CERT or SOC team (1-2 years) with security SIEM alerts handling via a ticketing tool and 24/7 operation.
- Basic knowledge of cyber threats and vulnerabilities: how to properly identify, triage, and remediate threats based on threat intelligence as well as on analysis of security events, log data and network traffic.
- Deliverable-oriented, with good report-writing skills and adaptation on complex and highly regulated environment.
- Good analytical and logical thinking skills.
- Team player, willing to cooperate with multiple colleagues across office locations in a cross-cultural environment.
- Fluent in spoken and written English, including security terminology.
Want AI-powered job matching?
Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.
Get Started Free