Senior Incident Response Specialist
Überblick
KI-Zusammenfassung
You are responsible for leading incident response and threat hunting in the Security Operations Center, ensuring threats are quickly contained and resolved. You will work closely with stakeholders to resolve incidents and improve threat detection and response capabilities.
Erforderliche Skills
Ausbildung
Tools & Technologien
Sprachen
Berufserfahrung
Deine Aufgaben
- Act as primary point of contact for incident response
- Collaborate with threat intelligence teams
- Perform forensic analysis on systems
- Develop detection rules and playbooks
- Ensure comprehensive documentation
- Lead proactive threat hunting activities
- Stay current on new threats
Benefits
Collaborative environment
High degree of freedom
Inspiring company culture
Competitive salary
Possibility to work from home
Vibrant Women in Tech community
Sportradar Pride group
Unternehmen
Sportradar
Sportradar is the world’s leading sports technology company, at the intersection between sports, media, and betting. More than 1,700 sports federations, media outlets, betting operators, and consumer platforms across 120 countries rely on our know-how and technology to boost their business.
Unternehmenskultur
Sportradar promotes kindness, sports, physical exercise, and teamplay, with an inclusive and diverse environment.
Diversity & Inclusion
Sportradar is committed to ensuring equal access to its programs, facilities, and employment opportunities.
Originale Stellenbeschreibung
Job Description
LOCATION: Work onsite in Vienna, Ljubljana, Sevilla, or Munich
WORK TYPE: Hybrid remote and onsite (3 days office, 2 days remote)
Job Description:
The Senior Incident Response Specialist will serve as a senior member of the Security Operations Center within the Information Security team, leading incident response and proactive threat hunts. This position requires a hands-on, expert-level professional responsible for proactively detecting, investigating, and responding to complex threats against the organization’s environment, particularly with applications and cloud infrastructure.
The Senior Incident Response Specialist will work closely with a diverse range of stakeholders to ensure any threats are quickly and effectively contained and any incident is brought to a rapid resolution. They will be responsible for managing incidents in strict alignment with relevant frameworks, such as NIST or ISO, and any applicable regulatory requirements, maintain adherence to organizational standards and compliance mandates. This role is critical in protecting the organization’s assets and improving its overall threat detection and response capabilities.
THE CHALLENGE:
-
Act as the primary point of contact for incident response within the SOC, taking ownership of incidents from detection through to remediation.
-
Collaborate with threat intelligence teams to incorporate emerging threat data and integrate relevant indicators of compromise into hunting and detection practices.
-
Perform forensic analysis on systems, applications, and cloud environments to trace the origin, scope, and impact of incidents.
-
Develop and refine detection rules, incident response playbooks, and investigation workflows to strengthen SOC capabilities and improve incident response effectiveness.
-
Ensure comprehensive documentation of threat hunting and incident response activities, providing detailed reporting on investigative findings, lessons learned, and recommended remediation steps.
-
Lead proactive threat hunting activities, identifying and investigating potential threats and vulnerabilities within the organization’s environment.
-
Stay current on new threats, vulnerabilities, and attack techniques, especially those targeting web applications and cloud services, and incorporate this knowledge into SOC processes.
YOUR PROFILE:
-
5+ years of experience in a SOC, with a strong focus on incident response and threat hunting.
-
Proven experience investigating and mitigating threats targeting web applications and cloud infrastructure (specifically AWS).
-
Deep experience conducting analysis of data from a diverse range of data sources using a SIEM.
-
Demonstrated expertise in performing forensic investigations and root cause analyses for complex incidents.
-
Experience with SIEM platforms, endpoint detection and response tools, and network traffic analysis.
-
Strong understanding of attack frameworks (e.g. MITRE ATT&CK) and the ability to apply them to threat hunting and incident response.
-
Experience creating detection rules, playbooks, and workflows to improve SOC detection and response efficiency.
Desired Experience:
-
Applying the results of previous incidents and threat hunting activities to creating new detection use cases.
-
Hands-on experience with AWS security services, such as GuardDuty, Security Hub, CloudTrail, and IAM configurations.
-
Familiarity with securing web applications, including common vulnerabilities (e.g. OWASP Top 10) and mitigation techniques.
-
Proficiency in scripting languages like PowerShell and Python.
-
Experience working within agile or continuous improvement environments.
Desired Qualifications:
-
Strong analytical skills, with the ability to handle high-pressure situations and manage complex security incidents from start to finish.
-
Effective communication skills, with the ability to produce clear, concise documentation and interact effectively with both technical and non-technical stakeholders.
-
Certifications in relevant fields, such as GCIH, GIAC, GCFA, AWS Certificated Security, CISSP, or equivalent.