Job description
EU Nationality required
We are seeking a highly experienced Cybersecurity professional to strengthen security operations, detection, and incident response capabilities within a complex and highly secure IT environment.
The role is hands-on and operational in nature, focusing on improving monitoring, response readiness, and forensic capabilities while also supporting and mentoring cybersecurity team members. The successful candidate will contribute directly to incident handling, tooling optimisation, and continuous security improvement initiatives.
Key Responsibilities
-
Review existing logging, monitoring, and detection mechanisms and propose enhancements to improve proactive threat identification and response.
-
Manage, configure, and enforce security policies and controls across on-premises and cloud-based environments.
-
Coordinate and review Cybersecurity Incident Response Plans and Digital Forensic Procedures, aligned with recognised threat and attack frameworks.
-
Analyse incidents and security events, identifying gaps and recommending technical and procedural improvements.
-
Prepare clear and structured reports for management, outlining findings, risks, and remediation actions.
-
Actively support incident response activities by guiding and mentoring cybersecurity team members.
-
Collaborate with internal IT teams, business units, and external stakeholders in a multicultural and international setting.
Mandatory Requirements
Education & Experience
-
Master’s degree in Information Technology, Computer Science, Electronics, or a related engineering discipline.
-
Minimum 15 years of professional IT experience, including at least 10 years in Cybersecurity.
-
Proven experience working in international and multicultural environments.
-
Professional proficiency in English (minimum C1 level).
Cybersecurity Operations & Incident Response
-
Strong background in Security Operations Centre (SOC) services.
-
Hands-on experience with incident detection, investigation, and response.
-
Experience operating within isolated, restricted, or highly secure IT environments.
Security Tooling & Technologies
-
Deployment, configuration, and maintenance of:
-
SIEM platforms (e.g. Splunk)
-
EDR solutions (e.g. Carbon Black or equivalent)
-
SOAR platforms
-
Vulnerability Management tools
-
Implementation and configuration of network security controls, including:
-
Firewalls
-
Proxies
-
Web Application Firewalls (WAF)
-
IDS / IPS
-
VPN technologies
-
Use of monitoring tools for security event detection and system health management (e.g. Splunk, cloud-native monitoring solutions).
Forensics & Malware Analysis
-
Experience in forensic artefact acquisition in enterprise environments.
-
Practical knowledge of malware analysis and investigation techniques.
Standards & Frameworks
-
Familiarity with:
-
ISO/IEC 27001
-
NIST security frameworks
-
GDPR / EU data protection regulations
-