- Germany
- Full time
- Unlimited
The GLS Group Security Operations Center is responsible for Security Monitoring, Incident Management, Vulnerability Management and Threat Intelligence.
As a SOC analyst Tier 3, you will be responsible for managing and enhancing the organization’s security posture. Your expertise will focus on incident response, threat hunting, and providing tactical guidance to strengthen our defenses against cyber threats. In your role you will report to the Manager Security Operations Center and support him in the cross-site operational management of information security within the GLS Group.
As a SOC analyst Tier 3, you will be responsible for managing and enhancing the organization’s security posture. Your expertise will focus on incident response, threat hunting, and providing tactical guidance to strengthen our defenses against cyber threats. In your role you will report to the Manager Security Operations Center and support him in the cross-site operational management of information security within the GLS Group.
What can you expect with us?
- Investigate and respond to complex security incidents escalated from Tier 2 analysts
- Analyze attack telemetry data, assess the scope of attacks, and develop containment and recovery strategies
- Develop and refine threat detection rules, incident response plans and playbooks
- Conduct forensic analysis and malware reverse engineering
- Coordinate with internal and external stakeholders during incident management
- Provide mentorship and training Tier 2 analysts
- Stay updated with the latest cybersecurity threats and incident response techniques
- Conduct advanced threat hunting to identify and mitigate stealthy attackers and potential weaknesses within the infrastructure
- Install and manage advanced security tools, ensuring proper detection and response capabilities
- Serve as a security advisor, offering expertise on the latest cybersecurity trends and best practices
- Participate in developing long-term security strategies
What do you bring to the table?
- Bachelor’s degree in Computer Science, Information Technology, or a related field is preferred
- Extensive experience in cybersecurity incident response
- Proficient in forensic tools and methodologies
- Strong understanding of network protocols, encryption, and operating systems
- Proven experience as a SOC Analyst with a focus on threat hunting and incident response
- Familiarity with IDS/IPS, SIEM, and endpoint protection tools
- Relevant certifications such as CISSP, CEH, or equivalent are highly desirable
- Ethical and detail-oriented with a keen eye for spotting anomalies
- Curiosity and a passion for learning about systems, security tools, and networking
- Excellent communication skills for documenting and reporting findings
- Excellent analytical and problem-solving skills
- Ability to work independently and make decisions under pressure