Cyber Incident Handling Analyst
Cyber Incident Handling Analyst

Cyber Incident Handling Analyst

Wiesbaden Vollzeit 48000 - 84000 € / Jahr (geschätzt) Kein Home Office möglich
SOSi

Auf einen Blick

  • Aufgaben: Join our Cyber Incident Response Team to analyze and respond to cyber threats.
  • Arbeitgeber: SOS International LLC is a leading provider of security solutions in Wiesbaden, Germany.
  • Mitarbeitervorteile: Enjoy a dynamic work environment with opportunities for growth and development.
  • Warum dieser Job: Make a real impact in cybersecurity while working with cutting-edge technologies.
  • Gewünschte Qualifikationen: Must have a Top Secret/SCI clearance and relevant certifications or experience.
  • Andere Informationen: Work on a rotating shift schedule in a collaborative team atmosphere.

Das voraussichtliche Gehalt liegt zwischen 48000 - 84000 € pro Jahr.

SOS International LLC (SOSi) is seeking a Cyber Incident Handling Analyst to support our customer in Wiesbaden, Germany . The Cyber Incident Handler will perform analytic analysis of cyber related events to detect and deter malicious actors using SIEM technologies, which correlate multiple security tool alerts and logs.

Essential Job Duties

  • Work as a member of the Cyber Incident Response Operations Team to increase the security posture of the customers‘ network.
  • Monitor SIEM platforms for alerts, events, and rules providing insight into malicious activities and/or security posture violations.
  • Review intrusion detection system alerts for anomalies that may pose a threat to the customers‘ network.
  • Identify and investigate vulnerabilities, assess exploit potential and suggest analytics for automation in the SIEM engines.
  • Report events through the incident handling process of creating incident tickets for deeper analysis and triage activities.
  • Coordinates and distributes directives, vulnerability, and threat advisories to identified consumers.
  • Issue triage steps to local touch labor organizations and Army units to mitigate or collect on-site data.
  • Perform post intrusion analysis to determine shortfalls in the incident detection methods.
  • Develop unique queries and rules in the SIEM platforms to further detection for first line cyber defenders.
  • Monitor the status of the intrusion detection system for proper alert reporting and system status.
  • Respond to the higher headquarters on incidents and daily reports.
  • Provide daily updates to Defensive Cyber Operations staff on intrusion detection operation and trends of events causing incidents.
  • Prepare charts and diagrams to assist in metrics analysis and problem evaluation and submit recommendations for data mining and analytical solutions.
  • Draft reports of vulnerabilities to increase customer situational awareness and improve the customers cyber security posture.
  • Assist all sections of the Defensive Cyber Operations team as required in performing Analysis and other duties as assigned.
  • May perform documentation and vetting of identified vulnerabilities for operational use.
  • May prepare and present technical reports and briefings.
  • Utilize a solid understanding of networking ports and protocols, their uses, and their potential misuses.

Minimum Requirements

  • An active in scope Top Secret/SCI clearance is required.
  • Bachelor in related discipline +3, AS +7, major certification +7 or 11+ years specialized experience.
  • Must meet DoD 8140 DCWF 531 requirements (B.S., A-150-1980, A-150-1202, A-150-1203, A150-1250, WSS 011, WSS 012GCFA, CBROPS, FITSP-O, GISF, CCSP, CEH, Cloud+, GCED, PenTest+, Security+, or GSEC).
  • Must meet DoD 8140 DCWF 511 requirements (B.S., M03385G; M10395B; M22385, A-150-1980, A-150-1202, A-150-1203, A-150-1250, A-531-0451, A-531-4421, A-531-1900, WSS 011, DISA-US1377, GFACT, GISF, Cloud+, GCED, PenTest+, Security+, or GSEC).
  • Must have one of the following certifications (Cisco CyberOps Professional, GCED, GCFA, GCFE, GCIH, GNFA, DCITA CIRC, FIWE or Offensive Security OSDA).
  • Must have a full, complete, and in-depth understanding of all aspects of Defensive Cyber Operations.
  • Must have a good breadth of knowledge of common ports and protocols of system and network services.
  • Experience in packet captures and analyzing a network packet.
  • Experience with intrusion detection systems such as Snort, Suricata, and/or Zeek.
  • Experience with SIEM systems such as Splunk and/or ArcSight.
  • Must have the demonstrated ability to communicate with a variety of stakeholders in a variety of formats.
  • Must be able to obtain certification as a Technical Expert by the German Government under the Technical Expert Status Accreditation (TESA) process.

Preferred Qualifications

  • Bachelors degree in Engineering, Computer Science, or Mathematics.
  • Experience with writing Snort or Suricata IDS rules.
  • Experience with writing complex Splunk SPL queries to correlate lookup tables with event logs to identify anomalies.
  • Experience with analyzing packets using Arkime or Wireshark.
  • Experience with Microsoft Windows event IDs.
  • Experience with Linux audit log analysis.
  • Familiarity with Git and VScode.
  • Experience with one or more scripting languages such as PowerShell, Bash, Python.

Work Environment

  • Normal office conditions.
  • Potential to work on multiple shifts in a rotation schedule covering a 24/7/365 mission.
  • On site in Wiesbaden, Germany.

Commitment to Diversity

SOSi does not discriminate against job applicants or employees on any legally recognized basis including, but not limited to age, race, color, religion, national origin, genetic information, sex, sexual orientation, gender identity or expression, marital status, disability, veteran status, or any other characteristic protected by applicable U.S. federal, state, and local laws.

#J-18808-Ljbffr

Cyber Incident Handling Analyst Arbeitgeber: SOSi

At SOS International LLC (SOSi), we pride ourselves on being an exceptional employer, particularly for the Cyber Incident Handling Analyst role in Wiesbaden, Germany. Our commitment to employee growth is evident through continuous training opportunities and a collaborative work culture that values diversity and innovation. With a focus on enhancing cybersecurity measures, you will be part of a dedicated team that not only supports our customers but also fosters your professional development in a dynamic and rewarding environment.
SOSi

Kontaktperson:

SOSi HR Team

StudySmarter Bewerbungstipps 🤫

So bekommst du den Job: Cyber Incident Handling Analyst

✨Tip Number 1

Familiarize yourself with the specific SIEM technologies mentioned in the job description, like Splunk and ArcSight. Having hands-on experience or relevant projects to discuss can really set you apart during the interview.

✨Tip Number 2

Brush up on your knowledge of intrusion detection systems such as Snort and Suricata. Being able to demonstrate your understanding of how to write rules for these systems will show that you're ready to contribute from day one.

✨Tip Number 3

Prepare to discuss your experience with packet analysis tools like Wireshark or Arkime. Real-world examples of how you've used these tools to identify vulnerabilities will impress the hiring team.

✨Tip Number 4

Since communication is key in this role, think of examples where you've effectively communicated complex technical information to non-technical stakeholders. This will highlight your ability to work within a team and coordinate with various parties.

Diese Fähigkeiten machen dich zur top Bewerber*in für die Stelle: Cyber Incident Handling Analyst

Analytical Skills
Incident Response
SIEM Technologies
Intrusion Detection Systems
Packet Analysis
Vulnerability Assessment
Cybersecurity Best Practices
Communication Skills
Technical Reporting
Network Protocols Knowledge
Automation in SIEM
Security Posture Evaluation
Problem-Solving Skills
Scripting Languages (PowerShell, Bash, Python)
Experience with Splunk and ArcSight
Understanding of Defensive Cyber Operations

Tipps für deine Bewerbung 🫡

Understand the Role: Before applying, make sure you fully understand the responsibilities of a Cyber Incident Handling Analyst. Familiarize yourself with SIEM technologies and the specific tools mentioned in the job description.

Tailor Your CV: Customize your CV to highlight relevant experience and skills that align with the job requirements. Emphasize your knowledge of intrusion detection systems, packet analysis, and any certifications you hold.

Craft a Strong Cover Letter: Write a compelling cover letter that explains why you are a great fit for the position. Mention your experience with cyber operations, your analytical skills, and how you can contribute to enhancing the security posture of the customer's network.

Highlight Certifications: Clearly list your certifications related to Defensive Cyber Operations and any other relevant qualifications. Make sure to mention your active Top Secret/SCI clearance, as it is a crucial requirement for this role.

Wie du dich auf ein Vorstellungsgespräch bei SOSi vorbereitest

✨Understand SIEM Technologies

Make sure you have a solid grasp of SIEM technologies and how they correlate alerts and logs. Be prepared to discuss your experience with platforms like Splunk or ArcSight, and how you've used them in previous roles.

✨Showcase Your Analytical Skills

Prepare to demonstrate your analytical skills by discussing specific incidents where you identified vulnerabilities or anomalies. Use examples that highlight your ability to assess exploit potential and suggest automation analytics.

✨Familiarize Yourself with Incident Handling Processes

Review the incident handling process thoroughly. Be ready to explain how you would create incident tickets and coordinate directives, as well as your approach to post-intrusion analysis.

✨Communicate Effectively

Since communication with various stakeholders is crucial, practice articulating complex technical concepts in simple terms. Prepare to discuss how you've effectively communicated findings or recommendations in past roles.

Cyber Incident Handling Analyst
SOSi
SOSi
  • Cyber Incident Handling Analyst

    Wiesbaden
    Vollzeit
    48000 - 84000 € / Jahr (geschätzt)

    Bewerbungsfrist: 2027-02-02

  • SOSi

    SOSi

    50 - 100
Ähnliche Positionen bei anderen Arbeitgebern
Europas größte Jobbörse für Gen-Z
discover-jobs-cta
Jetzt entdecken
>