Auf einen Blick
- Aufgaben: Join our Incident Response Team to tackle cyber threats and protect digital assets.
- Arbeitgeber: Swiss Post Cybersecurity is a leading provider of security solutions, enhancing cyber resilience with Swiss precision.
- Mitarbeitervorteile: Enjoy flexible hours, remote work options, and budget for training in a supportive team environment.
- Warum dieser Job: Be part of a dynamic team driving cybersecurity innovation and making a real impact on digital safety.
- Gewünschte Qualifikationen: 3+ years in SOC/CERT, strong OS knowledge, and fluent in French and English required.
- Andere Informationen: Swiss residents only; on-call duty and emergency travel may be necessary.
Das voraussichtliche Gehalt liegt zwischen 48000 - 84000 € pro Jahr.
Swiss Post Cybersecurity provides security solutions to protect digital assets and data, all developed and operated in Switzerland. Formed in 2024 from terreActive and Hacknowledge, we are a Swiss Post subsidiary headquartered in Aarau, with offices in Morges, Zurich and Luxembourg. We enhance cyber resilience with Swiss precision and innovation.
With more than 150 employees, we pool our expertise and experience to drive cybersecurity forward. Join our growing team and defend the digital future with us!
We are looking for an Incident Response and Forensic Analyst to join our Incident Response Team immediately or by arrangement. The ideal candidate will bring solid expertise and experience to help protect our customers from cyberattacks.
- Clarify doubts about suspicious behaviors or confirmed incidents on workstations or information systems
- Assist clients in managing security incidents, including APTs, ransomware, BECs, and more
- Conduct proactive threat hunting to identify past or ongoing compromises
- Build and deliver training sessions in academic or professional environments
- Lead kickoff meetings and present clear and actionable analyses to clients (primarily in French or English)
- Provide pragmatic recommendations, such as developing reconstruction plans for compromised environments
- Enhance team expertise by enriching methodologies, sharing research (tools/articles/insights), and developing/testing tools
- Collaborating closely with the SOC to improve real-time detection capabilities
- Promote CSIRT activities through impactful publications
- At least 3 years in SOC/CERT environment (including 2 years in participating in CSIRT/CERT activities) or handling advanced cyber threats (APTs, ransomware, BECs, etc.)
- Deep understanding of operating system internals and/or reverse engineering techniques such as Windows systems (e.g Win32API or internals), Active Directory, with GNULinux systems etc
- Familiarity with incident response tools and processes (e.g., Velociraptor, KAPE, Plaso).
- Proficiency in scripting or development to automate repetitive tasks such as intrusion detection scenarios
- Strong verbal and written communication skills in French (C1) and English (C1). German is a plus
- Bonus: Familiarity with MacOS, mobile forensics (Android/iOS), or public cloud environments (Azure/AWS/GCP) is a plus
- Swiss residents only and willing to participate in 24×7 on-call duty, with potential emergency travel to specific locations
- Bachelor’s or Master’s degree in a relevant field and/or certifications are a plus
- Independent work in a small, well-coordinated team
- A central location in Morges with facilities all over Switzerland
- Flexible working hours and remote work options
- Time and budget for targeted internal and external training
Incident Response and Forensic Analyst, CSIRT Member Arbeitgeber: Swiss Post Cybersecurity AG
Kontaktperson:
Swiss Post Cybersecurity AG HR Team
StudySmarter Bewerbungstipps 🤫
So bekommst du den Job: Incident Response and Forensic Analyst, CSIRT Member
✨Tip Number 1
Make sure to familiarize yourself with the specific incident response tools mentioned in the job description, like Velociraptor and KAPE. Having hands-on experience with these tools will not only boost your confidence but also demonstrate your readiness to hit the ground running.
✨Tip Number 2
Since strong communication skills in French and English are crucial for this role, consider practicing your presentation skills. You might even want to prepare a mock analysis presentation to showcase your ability to convey complex information clearly.
✨Tip Number 3
Engage with the cybersecurity community by attending relevant webinars or local meetups. This can help you stay updated on the latest threats and trends, and you might even make connections that could lead to valuable insights or referrals.
✨Tip Number 4
Highlight any experience you have with threat hunting and incident management in your discussions. Be prepared to share specific examples of how you've successfully identified and mitigated cyber threats in the past.
Diese Fähigkeiten machen dich zur top Bewerber*in für die Stelle: Incident Response and Forensic Analyst, CSIRT Member
Tipps für deine Bewerbung 🫡
Understand the Role: Make sure to thoroughly read the job description for the Incident Response and Forensic Analyst position. Highlight the key responsibilities and required skills, such as experience in SOC/CERT environments and proficiency in incident response tools.
Tailor Your CV: Customize your CV to reflect your relevant experience and skills that align with the job requirements. Emphasize your expertise in handling advanced cyber threats and any specific tools you have used, like Velociraptor or KAPE.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for cybersecurity and your understanding of the company's mission. Mention your ability to communicate effectively in French and English, and how you can contribute to enhancing their cyber resilience.
Highlight Your Communication Skills: Since strong verbal and written communication skills are crucial for this role, provide examples in your application that demonstrate your ability to present clear analyses and lead training sessions. This will show that you can effectively engage with clients and team members.
Wie du dich auf ein Vorstellungsgespräch bei Swiss Post Cybersecurity AG vorbereitest
✨Showcase Your Technical Expertise
Be prepared to discuss your experience with incident response tools and processes. Highlight specific examples of how you've handled advanced cyber threats like APTs or ransomware in previous roles.
✨Demonstrate Communication Skills
Since strong verbal and written communication skills are crucial, practice explaining complex technical concepts in simple terms. Be ready to present clear analyses and recommendations as you would in a client meeting.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving abilities. Think about past incidents you've managed and be ready to explain your thought process and the steps you took to resolve them.
✨Emphasize Team Collaboration
Highlight your ability to work independently while also being a team player. Discuss how you've collaborated with SOC teams or other departments to enhance detection capabilities and improve overall cybersecurity posture.