The AI Job Search Engine
Investigating complex escalations and multi-signal alerts across SIEM, EDR, and cloud platforms at a digital asset trading firm. Strong investigation skills in cloud and network security essential. On-call or shift environment expected.
Requirements
- 2–5+ years of SOC or incident response experience
- Strong investigation skills in cloud and network security
- Proficiency with SIEM and common SOC tooling
- Ability to write clear incident documentation
- Comfort in on-call or shift environments
- Detection engineering and SOAR automation experience
- Knowledge of DFIR fundamentals and artifact analysis
- Container and Kubernetes runtime security exposure
- Practical Python or Bash scripting skills
- Familiarity with digital-asset ecosystems and trading operations
- Relevant security certifications or equivalent
Tasks
- Investigate complex escalations and multi-signal alerts
- Analyze logs across SIEM, EDR, and cloud platforms
- Build incident timelines and scope assessments
- Lead technical triage and containment for high-severity incidents
- Execute and refine response playbooks for key scenarios
- Coordinate evidence collection for legal and compliance needs
- Enrich investigations with threat intelligence and ATT&CK mapping
- Maintain watchlists and detection logic for priority threats
- Tune correlation rules and policies to reduce false positives
- Implement new detections for emerging cloud and identity attacks
- Automate enrichment steps using SOAR workflows and scripts
- Mentor Level 1 analysts through coaching and feedback
- Manage shift handovers and document active cases
- Drive continuous improvement of SOC performance metrics
- Recommend IAM hardening to prevent incident recurrence
Education
- Vocational certificationOR
- Bachelor's degreeOR
- Master's degree
Languages
- English – Business Fluent
Tools & Technologies
- Splunk
- Elastic
- Sentinel
- CrowdStrike
- Defender
- Jira
- ServiceNow
- Sigma
- KQL
- SPL
- SOAR
- Kubernetes
- Python
- Bash
Not a perfect match?
- GetYourGuideFull-timeWith HomeofficeExperiencedBerlin
- Scalable GmbH
Security Operations Center (SOC) Analyst(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - Scalable GmbH
Senior Security Analyst(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Databricks
Sr. Staff Security Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - CANCOM
Incident Responder(m/w/x)
Full-timeWith HomeofficeExperiencedMünchen, Berlin, Leipzig, Stuttgart, Aachen, Hamburg, Köln, Hannover, Frankfurt am Main
Investigating complex escalations and multi-signal alerts across SIEM, EDR, and cloud platforms at a digital asset trading firm. Strong investigation skills in cloud and network security essential. On-call or shift environment expected.
Requirements
- 2–5+ years of SOC or incident response experience
- Strong investigation skills in cloud and network security
- Proficiency with SIEM and common SOC tooling
- Ability to write clear incident documentation
- Comfort in on-call or shift environments
- Detection engineering and SOAR automation experience
- Knowledge of DFIR fundamentals and artifact analysis
- Container and Kubernetes runtime security exposure
- Practical Python or Bash scripting skills
- Familiarity with digital-asset ecosystems and trading operations
- Relevant security certifications or equivalent
Tasks
- Investigate complex escalations and multi-signal alerts
- Analyze logs across SIEM, EDR, and cloud platforms
- Build incident timelines and scope assessments
- Lead technical triage and containment for high-severity incidents
- Execute and refine response playbooks for key scenarios
- Coordinate evidence collection for legal and compliance needs
- Enrich investigations with threat intelligence and ATT&CK mapping
- Maintain watchlists and detection logic for priority threats
- Tune correlation rules and policies to reduce false positives
- Implement new detections for emerging cloud and identity attacks
- Automate enrichment steps using SOAR workflows and scripts
- Mentor Level 1 analysts through coaching and feedback
- Manage shift handovers and document active cases
- Drive continuous improvement of SOC performance metrics
- Recommend IAM hardening to prevent incident recurrence
Education
- Vocational certificationOR
- Bachelor's degreeOR
- Master's degree
Languages
- English – Business Fluent
Tools & Technologies
- Splunk
- Elastic
- Sentinel
- CrowdStrike
- Defender
- Jira
- ServiceNow
- Sigma
- KQL
- SPL
- SOAR
- Kubernetes
- Python
- Bash
About the Company
Keyrock
Industry
FinancialServices
Description
The company is a leading change-maker in the digital asset space, specializing in market making, asset management, and trading services.
Not a perfect match?
- GetYourGuide
Security Analyst(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - Scalable GmbH
Security Operations Center (SOC) Analyst(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - Scalable GmbH
Senior Security Analyst(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Databricks
Sr. Staff Security Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - CANCOM
Incident Responder(m/w/x)
Full-timeWith HomeofficeExperiencedMünchen, Berlin, Leipzig, Stuttgart, Aachen, Hamburg, Köln, Hannover, Frankfurt am Main