Your area of work :
In your new position, you will become a member of the Cyber Defense team, part of Group Security. Cyber Defense team is responsible for all aspects of Security Information and Event Management (SIEM), Computer Emergency Response (CERT), and Security Operations Center (SOC).
In the advertised position, you will be focused on the analyzing and modelling security-related data, programmingUse Cases and Response Automations within the SIEM platform.
Your responsibilities :
- Design, develop, maintain and improve the quality of SIEM related use cases across a complex technology stack of DBG, required to timely detect and mitigate attacks and malicious activities.
- Participate in challenging investigation to proactively detect threats through usage of threat intelligence and threat hunting techniques to improve detection capabilities.
- Collaborate closely with the different unit in Cyber Defense to guarantee effectiveness of the current detection capabilities.
- Develop the automation capabilities to enrich alerts, support SOC analyst, reducing repetitive manual tasks and improve the speed of incident resolution.
- Work with subject matter experts across the Group to transform the maturity of the SIEM / SOC to an industry-leading organization.
- Support Cyber Defense becoming more mature by helping during the resolution of security incident, assisting with audit requests or contribute with technical recommendations.
Your profile :
University or comparable degree in Computer Science, Information Security, Engineering, or related discipline3+ years of experience working in the field of Cyber SecurityExperience working with SIEM platform, implementing use-cases and automation playbooks (Splunk, qRadar, SecOps, Sentinel o similar)Experience working with EDR platform (MDE, SentinelOne, Crowdstrike or similar)Solid technical background and practical knowledge in machine learning, databases, Python and other PLs, ETL & security engineeringGood knowledge and understanding of Cyber Security technologies, processes, and methodologies (e.g., SIEM, SOAR, EDR, IDS / IPS, threat analysis, incident response, forensics analysis, Kill Chain, MITRE ATT&CK)Excellent analytical skills, creativity, critical thinking, team player, ability to identify problems and propose solutionsProficiency in written and spoken English; French and / or German is an asset