
SOC/Blue Team Analyst
- Luxemburg
- Unbefristet
- Vollzeit
- 3-4+ years of hands-on experience working in a SOC or Blue Team environment
- Solid experience with at least two different SIEM platforms, such as Splunk, Microsoft Sentinel, Google Chronicle/SecOps, etc.
- Hunt for threats and improve detection strategies
- Assist the SOC Lead during major incidents and handle minor ones independently
- Build and optimize Splunk alerts, dashboards, and reports based on operational needs
- Identify tuning opportunities and collaborate with Engineering to enhance SIEM capabilities
- Maintain clear, up-to-date documentation for tools and processes
- Lead the creation of monthly SOC reports and provide insights to key stakeholders
- Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related technical field
- Deep understanding of SOC operations, incident response, and threat detection
- At least 3 years of experience in cybersecurity, ideally within Security Operations or Incident Response
- Solid experience with at least two different SIEM platforms, such as Splunk, Microsoft Sentinel, Google Chronicle/SecOps, etc.
- Familiarity with tools such as EDR, vulnerability scanners, TIPs, NDR/IPS
- Comfortable with scripting/programming (e.g., Python)
- Curious, pragmatic, and passionate about Cybersecurity and staying current with new threats
- Fluent English, both written and spoken
“Certified Incident Handler” “Cybersecurity Analyst+” “Blue Team Level 2”
- Previous experience in Financial Services or Managed Security Services
- Background in digital forensics, malware analysis, threat intelligence, security engineering, or cloud/network security
ITnation