What You'll Do
Lead the integration of new log sources into security monitoring platforms, ensuring reliable data ingestion and system stability. Diagnose and resolve technical issues involving clients and third-party vendors. Develop detailed technical playbooks and operational procedures to streamline security operations. Design and deploy detection logic using threat intelligence and customer-specific needs. Contribute specialized knowledge to enhance incident response workflows. Stay current with evolving tools, tactics, and methodologies in the security operations landscape.
Requirements
- Must be a citizen of one of the 32 NATO member countries
- Demonstrated proficiency with Azure Sentinel and the Microsoft Security ecosystem, or equivalent SIEM platforms such as Elastic, Splunk, or LogPoint
- Proven ability to develop and refine detection rules for threat identification
- Hands-on experience with SIEM query languages, Sigma rules, or YARA signatures
- Ideal candidates will have a minimum of two years as a SOC Analyst, with contributions to playbook development and incident handling
Preferred Qualifications
- Proficiency in Dutch or French is advantageous
Benefits
- 10,000€ training budget and 10 dedicated learning days every two years
- Opportunity to learn from certified SANS instructors and professionals with deep technical expertise
- Support for achieving advanced certifications such as GSE, GXPN, GREM, GCFA, or OSCP
- Regular participation in leading cybersecurity conferences including BlackHat and BruCON
- Personal coaching to support career growth and well-being
- Flexible work hours and remote work options
- 32 days of annual leave
- Flex Reward Plan for customized benefits
- Team events and innovation initiatives encouraged
- Agile, transparent, and entrepreneurial work culture