We are currently looking for an experienced Incident Responder / SOC Analyst to join our Cybersecurity Operations team. In this role, you will play a pivotal part in continuously monitoring and strengthening the organization's cyber defense posture, managing security incidents, and ensuring IT operational continuity during crises.
Your expertise will directly support the implementation of our Incident Response Plan, as well as regulatory compliance under frameworks such as NIS2 and GDPR.
Key responsibilities
Incident response & coordination
Contribute to the development, testing, and evolution of the organization's Incident Response Plan
Define and refine investigation and remediation playbooks
Threat detection & response
Monitor security events (logs, SIEM alerts, etc.) and identify potential incidents
Conduct in-depth triage, containment, eradication, and recovery actions
Vulnerability management & simulation
Evaluate and prioritize technical vulnerabilities
Conduct incident simulation exercises and penetration testing activities
Digital forensics & malware analysis
Perform forensic investigations on hosts, endpoints, and network traffic
Reverse-engineer malware and assess indicators of compromise (IoCs)
Reporting & regulatory compliance
Document incident response workflows and lessons learned
Collaborate with CISO, Legal, and Compliance teams to align with NIS2, GDPR, and internal standards
Continuous improvement
Define and track relevant KPIs and SLAs to measure detection and response effectiveness
Propose and implement enhancements to security tools, workflows, and readiness
Candidate profile
Education & experience
Bachelor's degree (or equivalent) in Computer Science or a related field
At least 13 years of hands-on experience in security incident response and SOC operations
Technical expertise
Deep knowledge of Windows, Linux, cloud platforms, and network infrastructure
Proven skills in forensics, malware analysis, log analysis, and penetration testing
Familiarity with tools such as SIEM, EDR, vulnerability scanners, etc
Proficient in scripting (Python, PowerShell, Bash)
Preferred certifications
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Network Forensic Analyst (GNFA)
GIAC Reverse Engineering Malware (Grem)
Soft skills
Calm and structured mindset in high-pressure situations
Excellent verbal and written communication skills
Strong analytical thinking and ability to translate complexity into clarity
Team player with a collaborative and proactive approach
Interested?
Apply now and let's build a safer digital future together.