This Job Vacancy has Expired!

Cyber Security Incident Response Analyst - 3 month contract

Posted on Feb 11, 2020 by Radley James Ltd

Eindhoven, Noord-Brabant, Netherlands
Immediate Start
Annual Salary

Cyber Security Incident Response Analyst - 3 month contract

My global client is looking for a Cyber Security Incident Response Analyst to join their team on a 3 month contract in Eindhoven. You will be reporting into the SOC Director and focus on security incident management, ensuring that incidents are timely and properly identified, analyzed and remediated. You will tackle the potentially damaging and difficult attacks a multinational organization experiences on a regular basis.


Participates in monitoring, triaging and incident response activities, including:

Handle escalated Security incidents from Level 1 and Level 2 Analysts (outsourced)

Collects, documents, and shares preliminary data for security incident investigators.

Contribute to our efforts to automate the detection of, and response to, malicious activity

Partnering with the IT Incident management team, making sure incident alignment is in place if needed

Ensures comprehensive, Real Time status updates and reporting to SOC Management and key stakeholders

Standardizing initial response for basic security alerts/reports, in order to automate

Recommends new use cases for SIEM for previously unidentified indicators

Work with partners in IT and Engineering to improve log coverage and quality

Identify, and help implement, improvements to our IR processes and procedures

The ideal candidate will:

Bachelors degree in Computer Information Systems or a related discipline, or equivalent experience

3+ years in IT/Information Security roles, with 1-3 years of experience in Incident Response at a Level 1 or higher Analyst capability within a SOC

CISSP, GIAC, CEH, or similar Information Security certification is preferred


Deep knowledge of IT/Information Security, tooling and processes

Subject Matter Expert in Incident Response

Analytical, solution and service-oriented.

Strong teamwork and collaboration skills

In-depth knowledge and understanding of cyber-attack vectors, malware analysis, cybercrime networks and methodologies

Familiarity with SIEM platforms (LogRythm, ArcSight, QRadar, etc) and supporting tooling (Splunk, Endpoint Forensics tooling, commodity malware and APT detection platforms)

Expertise in Endpoint Detection and Response tools (eg CarbonBlack, CrowdStrike, FireEye Endpoint Security)

Must understand APT solutions such as FireEye, Palo Alto Traps, Cisco AMP

Familiar with Microsoft platform (Windows, O365, Teams, Azure, etc)

Good written and verbal communication skills

Available after-working hours if needed

This is for an immediate start so please apply for an immediate response!

Reference: 842816623

Set up alerts to get notified of new vacancies.