Skip to content
mimi

IT Security Engineer

myitjob GmbH

On-site 6d ago

About the role

Location and Workload

  • Location: Baar
  • Workload: Full-time

Responsibilities

  • Act as a key contributor to security incident response management, including triage, investigation, containment, remediation, and post‑incident reviews.
  • Coordinate and lead response activities across IT, business, and external partners during security incidents and cyber crises.
  • Ensure the organization gains timely, accurate visibility into security threats and incidents, both internal and external.
  • Perform in‑depth analysis of security monitoring and alerting events, identify root causes, and define follow‑up and improvement actions.
  • Support the operation and continuous improvement of the Security Operations Center (SOC), including use cases, playbooks, and automation.
  • Conduct digital forensic work, including evidence collection, artifact analysis, and supporting incident investigations end‑to‑end.
  • Leverage scripting languages (e.g., Python, PowerShell, KQL/Sentinel queries) to automate investigation tasks, enrich detections, and enhance response workflows.
  • Engage in and coordinate tabletop exercise.
  • Contribute to the development and maintenance of incident response procedures, playbooks, and lessons learned.
  • Collaborate with stakeholders to help define security requirements, controls, and guardrails for the use of AI services and platforms.

Qualifications

  • Bachelor’s or master’s degree in Computer Science, Information Systems or related quantitative field.
  • Preferred certification: GCIH or equivalent.
  • Demonstrated hands‑on experience in security incident response is essential, including investigation, containment, remediation, and post‑incident activities.
  • Strong understanding of security monitoring, SIEM, EDR, and SOC processes (desirable).
  • Ability to keep up with the state‑of‑the‑art security trends in the market and quickly comprehend how to apply to Partners Group environments.
  • Foundational understanding of AI and machine learning concepts, with the ability to apply AI‑driven tools and technologies to enhance threat detection, investigation, and response workflows.
  • Strong proficiency in English, both spoken and written, with the ability to communicate clearly and produce high‑quality documentation.
  • Proactive and excellent collaboration with a team‑oriented approach to solve business problems with an entrepreneurial mindset to constantly improve the status quo.

Tags

  • Security
  • Support
  • Monitoring
  • Python
  • PowerShell
  • Bachelor
  • Master

Job Status

  • Aktiv

Reference: #J-18808-Ljbffr

Requirements

  • Demonstrated hands‑on experience in security incident response is essential, including investigation, containment, remediation, and post‑incident activities.
  • Foundational understanding of AI and machine learning concepts, with the ability to apply AI‑driven tools and technologies to enhance threat detection, investigation, and response workflows.
  • Strong proficiency in English, both spoken and written, with the ability to communicate clearly and produce high‑quality documentation.
  • Proactive and excellent collaboration with a team‑oriented approach to solve business problems with an entrepreneurial mindset to constantly improve the status quo.

Responsibilities

  • Act as a key contributor to security incident response management, including triage, investigation, containment, remediation, and post‑incident reviews.
  • Coordinate and lead response activities across IT, business, and external partners during security incidents and cyber crises.
  • Ensure the organization gains timely, accurate visibility into security threats and incidents, both internal and external.
  • Perform in‑depth analysis of security monitoring and alerting events, identify root causes, and define follow‑up and improvement actions.
  • Support the operation and continuous improvement of the Security Operations Center (SOC), including use cases, playbooks, and automation.
  • Conduct digital forensic work, including evidence collection, artifact analysis, and supporting incident investigations end‑to‑end.
  • Leverage scripting languages (e.g., Python, PowerShell, KQL/Sentinel queries) to automate investigation tasks, enrich detections, and enhance response workflows.
  • Engage in and coordinate tabletop exercise.
  • Contribute to the development and maintenance of incident response procedures, playbooks, and lessons learned.
  • Collaborate with stakeholders to help define security requirements, controls, and guardrails for the use of AI services and platforms.

Skills

KQLPowerShellPythonSentinel

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free