MG
IT Security Engineer
myitjob GmbH
On-site 6d ago
About the role
Location and Workload
- Location: Baar
- Workload: Full-time
Responsibilities
- Act as a key contributor to security incident response management, including triage, investigation, containment, remediation, and post‑incident reviews.
- Coordinate and lead response activities across IT, business, and external partners during security incidents and cyber crises.
- Ensure the organization gains timely, accurate visibility into security threats and incidents, both internal and external.
- Perform in‑depth analysis of security monitoring and alerting events, identify root causes, and define follow‑up and improvement actions.
- Support the operation and continuous improvement of the Security Operations Center (SOC), including use cases, playbooks, and automation.
- Conduct digital forensic work, including evidence collection, artifact analysis, and supporting incident investigations end‑to‑end.
- Leverage scripting languages (e.g., Python, PowerShell, KQL/Sentinel queries) to automate investigation tasks, enrich detections, and enhance response workflows.
- Engage in and coordinate tabletop exercise.
- Contribute to the development and maintenance of incident response procedures, playbooks, and lessons learned.
- Collaborate with stakeholders to help define security requirements, controls, and guardrails for the use of AI services and platforms.
Qualifications
- Bachelor’s or master’s degree in Computer Science, Information Systems or related quantitative field.
- Preferred certification: GCIH or equivalent.
- Demonstrated hands‑on experience in security incident response is essential, including investigation, containment, remediation, and post‑incident activities.
- Strong understanding of security monitoring, SIEM, EDR, and SOC processes (desirable).
- Ability to keep up with the state‑of‑the‑art security trends in the market and quickly comprehend how to apply to Partners Group environments.
- Foundational understanding of AI and machine learning concepts, with the ability to apply AI‑driven tools and technologies to enhance threat detection, investigation, and response workflows.
- Strong proficiency in English, both spoken and written, with the ability to communicate clearly and produce high‑quality documentation.
- Proactive and excellent collaboration with a team‑oriented approach to solve business problems with an entrepreneurial mindset to constantly improve the status quo.
Tags
- Security
- Support
- Monitoring
- Python
- PowerShell
- Bachelor
- Master
Job Status
- Aktiv
Reference: #J-18808-Ljbffr
Requirements
- Demonstrated hands‑on experience in security incident response is essential, including investigation, containment, remediation, and post‑incident activities.
- Foundational understanding of AI and machine learning concepts, with the ability to apply AI‑driven tools and technologies to enhance threat detection, investigation, and response workflows.
- Strong proficiency in English, both spoken and written, with the ability to communicate clearly and produce high‑quality documentation.
- Proactive and excellent collaboration with a team‑oriented approach to solve business problems with an entrepreneurial mindset to constantly improve the status quo.
Responsibilities
- Act as a key contributor to security incident response management, including triage, investigation, containment, remediation, and post‑incident reviews.
- Coordinate and lead response activities across IT, business, and external partners during security incidents and cyber crises.
- Ensure the organization gains timely, accurate visibility into security threats and incidents, both internal and external.
- Perform in‑depth analysis of security monitoring and alerting events, identify root causes, and define follow‑up and improvement actions.
- Support the operation and continuous improvement of the Security Operations Center (SOC), including use cases, playbooks, and automation.
- Conduct digital forensic work, including evidence collection, artifact analysis, and supporting incident investigations end‑to‑end.
- Leverage scripting languages (e.g., Python, PowerShell, KQL/Sentinel queries) to automate investigation tasks, enrich detections, and enhance response workflows.
- Engage in and coordinate tabletop exercise.
- Contribute to the development and maintenance of incident response procedures, playbooks, and lessons learned.
- Collaborate with stakeholders to help define security requirements, controls, and guardrails for the use of AI services and platforms.
Skills
KQLPowerShellPythonSentinel
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free