Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
TRR have been commissioned to identify multiple Cyber Security Analysts for a long term position working for the the European Institutions.
DESCRIPTION
Required Expertise
- Log management and SIEM solutions: Splunk and Cribl
- Security architecture and design of cybersecurity solutions
- Security events monitoring, management, and analysis and SIEM design.
- Container orchestration
- Network concepts and associated security solutions. In particular:
- Internet/Intranet/Extranet, authentication systems, Firewall, Proxies, Network
- IDS/IPS, e-mail gateways, IP security, Remote access control
- Windows Security:
- Windows workstation hardening
- Windows server hardening
- Windows Active Directory management and Security
- Logs collection, filtering, aggregation, and processing
- Linux Security:
- Linux management and hardening
- Linux workstations and servers monitoring (logs gathering and processing)
- Cloud environment; familiar with:
- Microsoft cloud environments and security tools (Sentinel, EntraID, Defender, etc.)
- AWS cloud environments and security tools (GuardDuty, Security hub, etc.)
Key Responsibilities
- Design, install and operate various cybersecurity solutions:
- Event log management and analytics: Splunk Enterprise, Cribl Stream Enterprise
- Incident Management and Response: various solutions and tools, running as containers in Hashicorp Nomad
- Manage changes in a structured and controlled way
- Regularly review and keep all solutions up to date
- Under the supervision of the Head of Service, he will contribute to all aspects of security design, deployment, and operation of all cybersecurity solutions under the responsibility of the unit
- Draft documentation:
- Design documentation of implemented solutions
- Operating procedures
- Interact regularly with the management and other ICT operations teams (network, data center, applications, and others):
- ensure proper and timely implementation of solutions
- ensure that requirements from different teams are considered
- escalate potential issues that can reduce the cybersecurity of the organization or jeopardize implementation of solutions
Key Skills
Ranked by relevanceReady to apply?
Join Technology & Risk Recruitment and take your career to the next level!
Application takes less than 5 minutes

