Welcome to Consort Group. For over 30 years, Consort Group has been helping companies leverage their data and infrastructure. It is backed by two leaders, Consortis and Consortia, and places people and social responsibility at the heart of its values.
L3 SOC Analyst / Detection Engineer M/F
What you’ll do
As L3 SOC Analyst / Detection Engineer, you will be responsible for advanced cybersecurity investigations and improving detection and response capabilities within our SOC ecosystem.
Build side
* Design, develop, test, and maintain SIEM/EDR/XDR detection use cases and correlation rules
* Improve existing detections to reduce false positives and increase detection fidelity
* Translate threat intelligence into actionable detection content
* Validate detection effectiveness through simulations, purple team exercises, and adversary emulation
* Develop and improve SOC playbooks, procedures, and automation capabilities
* Identify gaps in monitoring, detection, and incident response processes
* Contribute to SOC reporting, metrics, and operational maturity initiatives
* Support knowledge sharing and mentor junior SOC analysts
Run side
* Lead investigation and resolution of complex and high‑severity cybersecurity incidents
* Support L1 and L2 analysts during incident escalations
* Conduct advanced forensic investigations and root cause analysis
* Coordinate containment, eradication, and recovery activities with IT and security teams
* Perform proactive threat hunting using threat intelligence and behavioral analysis
* Analyze malware, phishing campaigns, suspicious behaviors, and advanced attack patterns
* Identify attacker tactics, techniques, and procedures (TTPs) aligned with MITRE ATT&CK
What we’re looking for
* You have at least 5 years of experience in cybersecurity operations or SOC environments.
* You have strong experience in incident response, threat hunting, or detection engineering.
* You are experienced in handling high‑severity cybersecurity incidents and working within mature SOC environments.
* You enjoy improving detection capabilities and strengthening operational security processes.
* You are looking for an environment where collaboration, operational excellence, and cybersecurity maturity matter.
* Incident response and forensic investigation
* Threat hunting and behavioral analysis
* SIEM, EDR, and XDR detection engineering
* Detection use cases and correlation rules
* Threat intelligence and MITRE ATT&CK framework
* Malware and phishing analysis
* Purple team exercises and adversary emulation
* SOC processes, playbooks, and operational improvement
* Strong analytical and problem‑solving mindset
* Ability to support and mentor junior analysts
* Strong communication and escalation management skills
* Proactive and detail‑oriented approach
* Ability to work effectively during high‑severity incidents
Language Skills
* English – Professional proficiency
* French or Dutch – Full proficiency
Good to know
Location: Brussels
Contract: Permanent contract / Freelance
Remote work: Hybrid
Job category: Cybersecurity / SOC / Detection Engineering
#J-18808-Ljbffr