Information Security Engineer - SOC Service Coordinator (f/m/d)

Date: 10 Apr 2024

Location: Prague, CZ

Company: Deutsche Börse Group

 

Your area of work:

 

DBG CERT is looking for a highly motivated Security Engineer whose responsibility will be to ensure that the initial triage and analysis of cyber threats, reported by our SIEM solution to SOC L1 and L2 analysts, is performed in a timely fashion and in accordance with DBG quality standards as well as with regulators requirements and contractual agreements (e.g. SLA response/resolution time) with our internal customers. At this position you will be also responsible to identify and propose improvements on SOC/CERT runbooks as well as tuning of SIEM use cases to reduce the risks of false positives, false negatives and hence improve incident management escalation and handling.

 

Your responsibilities:

 

  • Identify and propose adjustments/improvements on SOC runbooks based for example on false positives, tuning of SIEM use cases and audit findings.
  • Engagement with internal IT functions might be required to fill the identified gaps (e.g. lack of details in asset inventory) in the alert handling process.
  • Identify and propose adjustments/improvements on SIEM UCs based for example on false positives reported by SOC and audit findings
  • Quality check and end-to-end testing of SOC runbooks
  • Preparation for audits (evidence/requests handling) and attendance
  • Attendance to regular calls with SOC Service Manager
  • Participate in Blue/Red teams exercise to test and improve our monitoring and response capabilities

 

 

Your profile:

 

  • Solid experience in a CERT or SOC team with SIEM alerts handling, workflow design and runbook preparation.
  • Knowledge of cyber threats and vulnerabilities: how to properly identify, triage, and remediate threats based on threat intelligence as well as on analysis of security events, log data and network traffic.
  • Expert working knowledge of technical and organizational aspects of information security, e.g., through prior defensive or offensive work experience
  • Solid understanding of cyber threats and MITRE ATT&CK framework
  • Deliverable-oriented, with strong problem-solving skills and adaptation on complex and highly regulated environment
  • Team player willing to cooperate with multiple colleagues across office locations in a cross-cultural environment
  • Good report-writing skills to present the findings of investigations
  • Available during the working hours (Mo-Fr) + on-call duty
  • Fluent in spoken and written English, including security terminology; proficiency in German is a plus

 

 

Strong assets:

 

  • Willingness & ability to take the lead on complex Cyber Security investigations supporting CERT lead
  • Development of automation of various CERT/SOC processes via SOAR solution
  • Red Teaming/Purple Teaming exercises
  • Background in Malware Analysis, Digital Forensics and/or Cyber Threat Intelligence
  • Experience in Threat Hunting including the ability to leverage intelligence data to proactively identify and iteratively investigates suspicious behaviour across networks and systems
  • Script Development (e.g. Python, Shell scripting)
  • Cloud Security expertise (primarily GCP and Azure)
  • Vulnerability Handling / Management
  • Relevant Industry Certifications such as SANS/GIAC (e.g., GCIA, GCIH, GNFA, GCFA), CompTIA (Security+, Cloud+, PenTest+), OSCP, eLearnSecurity are desirable.