Die KI-Suchmaschine für Jobs
SOC Analyst (Level 2)(m/w/x)
Investigating complex escalations and multi-signal alerts across SIEM, EDR, and cloud platforms at a digital asset trading firm. Strong investigation skills in cloud and network security essential. On-call or shift environment expected.
Anforderungen
- 2–5+ years of SOC or incident response experience
- Strong investigation skills in cloud and network security
- Proficiency with SIEM and common SOC tooling
- Ability to write clear incident documentation
- Comfort in on-call or shift environments
- Detection engineering and SOAR automation experience
- Knowledge of DFIR fundamentals and artifact analysis
- Container and Kubernetes runtime security exposure
- Practical Python or Bash scripting skills
- Familiarity with digital-asset ecosystems and trading operations
- Relevant security certifications or equivalent
Aufgaben
- Investigate complex escalations and multi-signal alerts
- Analyze logs across SIEM, EDR, and cloud platforms
- Build incident timelines and scope assessments
- Lead technical triage and containment for high-severity incidents
- Execute and refine response playbooks for key scenarios
- Coordinate evidence collection for legal and compliance needs
- Enrich investigations with threat intelligence and ATT&CK mapping
- Maintain watchlists and detection logic for priority threats
- Tune correlation rules and policies to reduce false positives
- Implement new detections for emerging cloud and identity attacks
- Automate enrichment steps using SOAR workflows and scripts
- Mentor Level 1 analysts through coaching and feedback
- Manage shift handovers and document active cases
- Drive continuous improvement of SOC performance metrics
- Recommend IAM hardening to prevent incident recurrence
Ausbildung
- Abgeschlossene BerufsausbildungODER
- Bachelor-AbschlussODER
- Master-Abschluss
Sprachen
- Englisch – verhandlungssicher
Tools & Technologien
- Splunk
- Elastic
- Sentinel
- CrowdStrike
- Defender
- Jira
- ServiceNow
- Sigma
- KQL
- SPL
- SOAR
- Kubernetes
- Python
- Bash
Noch nicht perfekt?
- GetYourGuideVollzeitmit HomeofficeBerufserfahrenBerlin
- Scalable GmbH
Security Operations Center (SOC) Analyst(m/w/x)
Vollzeitmit HomeofficeBerufserfahrenBerlin - Scalable GmbH
Senior Security Analyst(m/w/x)
Vollzeitmit HomeofficeSeniorBerlin - Databricks
Sr. Staff Security Engineer(m/w/x)
Vollzeitmit HomeofficeSeniorBerlin - CANCOM
Incident Responder(m/w/x)
Vollzeitmit HomeofficeBerufserfahrenMünchen, Berlin, Leipzig, Stuttgart, Aachen, Hamburg, Köln, Hannover, Frankfurt am Main
SOC Analyst (Level 2)(m/w/x)
Investigating complex escalations and multi-signal alerts across SIEM, EDR, and cloud platforms at a digital asset trading firm. Strong investigation skills in cloud and network security essential. On-call or shift environment expected.
Anforderungen
- 2–5+ years of SOC or incident response experience
- Strong investigation skills in cloud and network security
- Proficiency with SIEM and common SOC tooling
- Ability to write clear incident documentation
- Comfort in on-call or shift environments
- Detection engineering and SOAR automation experience
- Knowledge of DFIR fundamentals and artifact analysis
- Container and Kubernetes runtime security exposure
- Practical Python or Bash scripting skills
- Familiarity with digital-asset ecosystems and trading operations
- Relevant security certifications or equivalent
Aufgaben
- Investigate complex escalations and multi-signal alerts
- Analyze logs across SIEM, EDR, and cloud platforms
- Build incident timelines and scope assessments
- Lead technical triage and containment for high-severity incidents
- Execute and refine response playbooks for key scenarios
- Coordinate evidence collection for legal and compliance needs
- Enrich investigations with threat intelligence and ATT&CK mapping
- Maintain watchlists and detection logic for priority threats
- Tune correlation rules and policies to reduce false positives
- Implement new detections for emerging cloud and identity attacks
- Automate enrichment steps using SOAR workflows and scripts
- Mentor Level 1 analysts through coaching and feedback
- Manage shift handovers and document active cases
- Drive continuous improvement of SOC performance metrics
- Recommend IAM hardening to prevent incident recurrence
Ausbildung
- Abgeschlossene BerufsausbildungODER
- Bachelor-AbschlussODER
- Master-Abschluss
Sprachen
- Englisch – verhandlungssicher
Tools & Technologien
- Splunk
- Elastic
- Sentinel
- CrowdStrike
- Defender
- Jira
- ServiceNow
- Sigma
- KQL
- SPL
- SOAR
- Kubernetes
- Python
- Bash
Über das Unternehmen
Keyrock
Branche
FinancialServices
Beschreibung
The company is a leading change-maker in the digital asset space, specializing in market making, asset management, and trading services.
Noch nicht perfekt?
- GetYourGuide
Security Analyst(m/w/x)
Vollzeitmit HomeofficeBerufserfahrenBerlin - Scalable GmbH
Security Operations Center (SOC) Analyst(m/w/x)
Vollzeitmit HomeofficeBerufserfahrenBerlin - Scalable GmbH
Senior Security Analyst(m/w/x)
Vollzeitmit HomeofficeSeniorBerlin - Databricks
Sr. Staff Security Engineer(m/w/x)
Vollzeitmit HomeofficeSeniorBerlin - CANCOM
Incident Responder(m/w/x)
Vollzeitmit HomeofficeBerufserfahrenMünchen, Berlin, Leipzig, Stuttgart, Aachen, Hamburg, Köln, Hannover, Frankfurt am Main