Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Location : Brussel, VLG
Contract Duration : 6 Months
Work Mode : Onsite
Overview :
1. Act as a first-line SOC analyst (approximately 60% of the time), working in a fast-paced and
dynamic team environment where everyone, including management, contributes to L1
analysis.
2. Collaborate with the team to develop and implement use cases and/or engineer new solutions
and/or generate reports and/or perform other tasks as agreed upon with the consultant
(approximately 40% of the time).
3. Utilize our client SOC stack, which includes Splunk, TheHive, and Tines as an automation
platform.
4. Stay up-to-date with emerging threats and technologies, applying this knowledge to improve
our SOC operations and incident response capabilities.
SPECIFIC KNOWLEDGE, SKILLS AND EXPERTISE:
The following specific knowledge, skills and expertise are required for the performance of the above listed tasks.
Experience with SIEM platform like Splunk for anomaly detection and threat hunting
Experience with Incident Response Platform like TheHive for case management and collaboration
Experience with SOC automation (eg. Tines automation)
CT: experience with tools like MISP or OpenCTI
EDR/XDR: Experience with EDR platform (eg. Bitdefender Gravity for endpoint security)
Incident response: experience in incident response and digital forensic and especially in the field of windows forensic.
Experience with scripting and programming languages (e.g., PowerShell, Python, Ruby, Bash) to automate tasks and develop custom testing scripts is needed.
Experience: At least 6 years of experience in a SOC.
Due to the particular nature of a large international organization such as EEAS, and due to the nature of activities in the cybersecurity domain, candidates should also have the following non-technical skills:
Ability to integrate in an international/multicultural environment, rapid self-starting capability and experience in working in team;
Ability to participate in multilingual meetings;
Ability to work in multi-cultural environment, on multiple large projects;
Ability to work in an extremely agile team environment, with a willingness to adapt to changing priorities and tasks.
Ability to establish trusting relationships with counterparts in partnering organizations;
Excellent team player
High degree of discretion and integrity.
Certifications: Certification(s) in digital forensics and incident response is an advantage (p.e. GCFA and/or GCFE and/or ECIH and/or OffSec IR-200). At least one relevant certification in the field.
Key Skills
Ranked by relevanceReady to apply?
Join Sansaone and take your career to the next level!
Application takes less than 5 minutes

