Cybersecurity Consultant – Security Operations & Incident Response
Responsibilities:
- Security Monitoring: Oversee network, endpoint, and application security across on-premises and cloud environments with a continuous focus on threat detection.
- Threat Intelligence: Integrate relevant intelligence feeds and enrich SIEM alerts with contextual information for effective incident prioritization.
- Triage and Investigation: Tailor SIEM detections to reflect business threats and conduct in-depth analysis of security incidents and events.
- Incident Response: Actively detect and respond to cyberattacks, ensuring coordinated action with internal teams and external partners when necessary.
- Forensics & Root Cause Analysis: Collect evidence and analyze incident data to identify sources and methods of compromises.
- DEV Team Support: Work closely with development teams to remediate vulnerabilities discovered through pentesting and vulnerability assessments, ensuring timely resolution.
- Cybersecurity Enhancements: Partner with cross-functional teams to implement technical improvements that reinforce the company’s overall cybersecurity posture.
- DevSecOps Rollout: Collaborate on DevSecOps initiatives under the guidance of an established subject matter expert.
Scope:
- Operate in an international environment using both English and French.
- Engage with cloud and OT technologies, and security solutions such as EDR, SIEM, CSPM, Vulnerability Scanners.
- Support major security initiatives, such as DevSecOps, Cloud Security, and Vulnerability Management improvement projects.
Technical Expectations:
- Leverage expertise in endpoint security management, SIEM management (Splunk), vulnerability assessment, and Azure DevOps.
- Possess skills in scripting (Python, PowerShell), and experience with Privileged Access Management (PAM) is considered an asset.
- Apply knowledge in security architecture (network, Active Directory, Citrix), web application security (WAF, API security, secure coding), and infrastructure security (IPS, VPN, NAC, ZTNA).
- Participate in offensive security activities, including technical intrusion testing.
The role requires a strong focus on operational excellence and high-quality delivery in a dynamic environment.
We are looking for candidates who thrive in dynamic, high-stakes environments and demonstrate a deep commitment to operational excellence in cybersecurity. The ideal person is curious, analytical, and solutions-driven, able to rapidly assess complex situations and collaborate across teams to drive impactful security improvements.
- Analytical Mindset: Excels at deconstructing incidents to uncover patterns and root causes, with an instinct for cross-referencing diverse intelligence feeds to add context and clarity.
- Proactive and Resourceful: Demonstrates initiative in identifying potential vulnerabilities, proposing solutions, and supporting development teams in remediation efforts.
- Strong Communicator: Communicates effectively in both English and French with technical teams and business stakeholders in an international setting.
- Team Player: Enjoys collaborative problem solving with SOC, DevOps, and infrastructure teams, embracing knowledge sharing and continuous learning.
- Technically Versatile: Possesses hands-on skills in security operations and incident analysis, with significant exposure to cloud technologies, web application security, and infrastructure security tools (SIEM, EDR, CSPM, WAF, NAC, ZTNA, etc.).
- Scripting and Automation Enthusiast: Demonstrates the ability (or eagerness to deepen expertise) in scripting and automation (Python, PowerShell), recognizing their value in security monitoring and process improvement.
- Adaptable and Continuous Learner: Keeps pace with evolving threats and industry best practices, readily adapting approaches to new contexts such as DevSecOps or OT security.
- Methodical and Reliable: Handles incident response and vulnerability management processes with rigor and a keen eye for detail, ensuring consistent delivery quality in a high-performance culture.
- Advantageous Experience: Experience with PAM solutions, technical architecture of networked environments (such as AD, Citrix), and offensive security techniques will distinguish the strongest candidates.
- Client-Focused: Prioritizes the business impact of technical recommendations, customizing security measures to fit both risk posture and operational constraints.
We place a premium on intellectual curiosity, professional integrity, and the drive to achieve tangible improvements in organizational cybersecurity maturity. If you are energized by complex challenges, cross-functional collaboration, and the pursuit of security excellence, you will excel in this role.
Vergelijkbare banen
De perfecte match is nog maar één stap hiervandaan.
Stuur ons direct uw CV en wij brengen u in contact met een van onze gespecialiseerde recruiter die u zal begeleiden in de zoektocht naar uw droombaan!
Laatste artikels
Een succesvolle employer branding-strategie, in 7 stappen
Employer branding is essentieel voor elk bedrijf dat talent wil aantrekken én behouden. Er zijn tal van goede redenen om een sterk merk als werkgever uit te bouwen. Maar zoiets doe je niet van vandaag op morgen. Hoe pak je dat aan, starten met employer branding?
De strafste employer branding-trends van 2024
Employer branding is in sneltempo uitgegroeid tot een echte must voor werkgevers die het verschil willen maken, in de strijd om toptalent.
7 risico’s die jouw imago als werkgever beschadigen
Bedrijven investeren vandaag aanzienlijke budgetten in de marketing van hun merk als aantrekkelijke werkgever.
Sluit aan bij onze community van professionals en ontdek je potentieel om een verschil te maken in de wereld.
Blijf op de hoogte van het laatste nieuws.