
Incident Response and SOC Expert
- Bruxelles
- CDI
- Temps-plein
We are dedicated to responsible digitalisation, building innovative, inclusive solutions that drive meaningful impact. With over 8,900 professionals across Europe, we help EU institutions, public and private organisations thrive in a rapidly evolving digital world. Are you ready to shape the future through technology? Your journey starts here. Take a look at some of our impactful projects here: https://netcompany.com/cases/Job DescriptionAre you ready to discover the role of an Incident Response and SOC Expert in Netcompany?Monitor the organisation's (cyber) security state, manage incident during cyber-attacks and assure the continued operations of ICT systems. Analyses, evaluates, and mitigates the impact of (cyber) security incidents. Restores systems' and processes' functionalities to an operational state according to the organisation's Incident Response Plan.As an Incident Response and SOC Expert, you will:
- Practice all technical, functional and operational aspects of (cyber)security incident handling and response.
- Work on operating systems, servers, clouds and relevant infrastructures (e.g., languages, software and emerging technologies, programming).
- Investigate digital evidence from networks and systems to uncover the details of security incidents, identify attacker actions, and recover compromised data.
- Dissect malicious software in controlled environments to understand its behavior, capabilities, and how to defend against it.
- Ethically simulate cyberattacks on systems and applications to proactively identify and report security vulnerabilities before they can be exploited.
- Maintain effective decision-making and operational focus during high-stress cybersecurity incidents and time-critical situations.
- Lead incident response efforts, clearly articulate technical findings to various audiences, and document events and analyses.
- Systematically collect, review, and interpret log data from various sources to detect threats, investigate incidents, and ensure operational awareness.
- A university degree in Computer Science, Information Technology, or a related field, complemented by a minimum of 10 years' relevant experience.
- The ability to contribute significantly to the development, maintenance, and assessment of the Incident Response Plan.
- Expertise in developing, implementing, and assessing robust procedures related to incident handling.
- Proven capability to identify, analyze, mitigate, and effectively communicate (cyber) security incidents.
- Proficiency in assessing and managing technical vulnerabilities.
- The skill to evaluate the resilience of (cyber) security controls and the effectiveness of mitigation actions taken after a (cyber) security or data breach incident.
- Experience in establishing clear procedures for incident results analysis and comprehensive incident handling reporting.
- A collaborative approach, demonstrated by the ability to cooperate effectively with Secure Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs).
- The aptitude to cooperate with key personnel (e.g., CISO, Legal and compliance officer) for the accurate reporting of security incidents according to applicable legal frameworks (NIS, GDPR, etc.).
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Reverse Engineering Malware (GREM)
- Knowledge of other European languages is a plus
- The opportunity to work in a modern environment.
- A competitive compensation & benefits package
- Hospitalization plan
- Hybrid working model
- Meal and commuting allowance
- Well-being activities (on premises)
- Continuous learning opportunities using the most modern methods (unlimited access to Udemy for Business, ad-hoc trainings)
- A personalized development plan for targeted career growth