Your personal AI career agent
Investigating complex escalations and multi-signal alerts across SIEM, EDR, and cloud platforms at a digital asset trading firm. Strong investigation skills in cloud and network security essential. On-call or shift environment expected.
Requirements
- 2–5+ years of SOC or incident response experience
- Strong investigation skills in cloud and network security
- Proficiency with SIEM and common SOC tooling
- Ability to write clear incident documentation
- Comfort in on-call or shift environments
- Detection engineering and SOAR automation experience
- Knowledge of DFIR fundamentals and artifact analysis
- Container and Kubernetes runtime security exposure
- Practical Python or Bash scripting skills
- Familiarity with digital-asset ecosystems and trading operations
- Relevant security certifications or equivalent
Tasks
- Investigate complex escalations and multi-signal alerts
- Analyze logs across SIEM, EDR, and cloud platforms
- Build incident timelines and scope assessments
- Lead technical triage and containment for high-severity incidents
- Execute and refine response playbooks for key scenarios
- Coordinate evidence collection for legal and compliance needs
- Enrich investigations with threat intelligence and ATT&CK mapping
- Maintain watchlists and detection logic for priority threats
- Tune correlation rules and policies to reduce false positives
- Implement new detections for emerging cloud and identity attacks
- Automate enrichment steps using SOAR workflows and scripts
- Mentor Level 1 analysts through coaching and feedback
- Manage shift handovers and document active cases
- Drive continuous improvement of SOC performance metrics
- Recommend IAM hardening to prevent incident recurrence
Work Experience
- approx. 1 - 4 years
Education
- Vocational certificationOR
- Bachelor's degreeOR
- Master's degree
Languages
- English – Business Fluent
Tools & Technologies
- Splunk
- Elastic
- Sentinel
- CrowdStrike
- Defender
- Jira
- ServiceNow
- Sigma
- KQL
- SPL
- SOAR
- Kubernetes
- Python
- Bash
Not a perfect match?
- Scalable GmbHFull-timeWith HomeofficeExperiencedBerlin
- GetYourGuide
Security Analyst(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - Scalable GmbH
Senior Security Analyst(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Databricks
Sr. Staff Security Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Eye Security
SOC Analyst - Tier 1(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin
Investigating complex escalations and multi-signal alerts across SIEM, EDR, and cloud platforms at a digital asset trading firm. Strong investigation skills in cloud and network security essential. On-call or shift environment expected.
Requirements
- 2–5+ years of SOC or incident response experience
- Strong investigation skills in cloud and network security
- Proficiency with SIEM and common SOC tooling
- Ability to write clear incident documentation
- Comfort in on-call or shift environments
- Detection engineering and SOAR automation experience
- Knowledge of DFIR fundamentals and artifact analysis
- Container and Kubernetes runtime security exposure
- Practical Python or Bash scripting skills
- Familiarity with digital-asset ecosystems and trading operations
- Relevant security certifications or equivalent
Tasks
- Investigate complex escalations and multi-signal alerts
- Analyze logs across SIEM, EDR, and cloud platforms
- Build incident timelines and scope assessments
- Lead technical triage and containment for high-severity incidents
- Execute and refine response playbooks for key scenarios
- Coordinate evidence collection for legal and compliance needs
- Enrich investigations with threat intelligence and ATT&CK mapping
- Maintain watchlists and detection logic for priority threats
- Tune correlation rules and policies to reduce false positives
- Implement new detections for emerging cloud and identity attacks
- Automate enrichment steps using SOAR workflows and scripts
- Mentor Level 1 analysts through coaching and feedback
- Manage shift handovers and document active cases
- Drive continuous improvement of SOC performance metrics
- Recommend IAM hardening to prevent incident recurrence
Work Experience
- approx. 1 - 4 years
Education
- Vocational certificationOR
- Bachelor's degreeOR
- Master's degree
Languages
- English – Business Fluent
Tools & Technologies
- Splunk
- Elastic
- Sentinel
- CrowdStrike
- Defender
- Jira
- ServiceNow
- Sigma
- KQL
- SPL
- SOAR
- Kubernetes
- Python
- Bash
About the Company
Keyrock
Industry
FinancialServices
Description
The company is a leading change-maker in the digital asset space, specializing in market making, asset management, and trading services.
Not a perfect match?
- Scalable GmbH
Security Operations Center (SOC) Analyst(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - GetYourGuide
Security Analyst(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin - Scalable GmbH
Senior Security Analyst(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Databricks
Sr. Staff Security Engineer(m/w/x)
Full-timeWith HomeofficeSeniorBerlin - Eye Security
SOC Analyst - Tier 1(m/w/x)
Full-timeWith HomeofficeExperiencedBerlin