IT Security Specialist (24/7)

Apply for this position

Offer description:

The CIDIR team (Cybersecurity Incident Detection and Initial Response) provides 24/7 security operations monitoring and support for BTC customers and subsidiaries. We provide comprehensive solutions for main players in German Energy Sector, where your collaboration will help to protect systems that impact millions of people. You can expect that taking up the offer for this position will boost your technical, architectural and system skill.

We require specific expertise in the field related to the job description, your collaboration and participation in many activities within our security projects. Proactive approach and motivation to help drive change and advancement are necessary. To fully take advantage of this opportunity you will need to have an already developed baseline and be familiar with multiple aspects of general IT and Security standards.

You can expect to interact frequently with other members of the Security department and the IT technical teams along with the IT Operations and Engineering teams.


Our main tech stack tools:

 

  • ELASTIC
  • ATLASSIAN (Jira,Confluence)
  • Microsoft M365 & Azure Cloud (Defenders, Sentinel etc.)
  • Trellix Endpoint Security
  • Fortigate
  • Qualys
  • Omnitracker
  • Citrix/VMware
  • Icinga

Your tasks:

  • conducting proactive monitoring, investigations, and mitigation of security events
  • analysing security event data from SIEM, Dashboards, log sources etc
  • spending time to understand the environment you are responsible for and engaging with various teams to gain further knowledge of the environment(s)
  • recognizing potential, successful, and unsuccessful intrusion attempts through review and analysis of relevant event data
  • research new and evolving threats with potential to impact the monitored environment
  • triage, investigating, and escalating alerts as they occur in Windows and Linux environments
  • pulling data from multiple sources, including endpoint protection and response, internal data feeds, threat intelligence, and advanced phishing protection
  • working with our internal security teams to share knowledge, training, and best practices
  • receiving internal and external training on technologies you will be monitoring, incident response and other technical security topics
  • recommending changes to standard operating procedures and similar documentation
  • responding to computer security incidents by collecting, analysing, and preserving digital evidence and ensuring that incidents are properly recorded and tracked in accordance with requirements
  • analysing new alerts generated by correlation or alerting tools, as well as other external alert sources and provide feedback and assessment for potential refinement
  • reviewing dashboards for anomalous activities
  • analysing complex/unusual incidents and ensuring to provide correct escalation paths
  • Join us if:

  • minimum 3 years of experience in the field of Information Systems or IT security-related functions
  • solid understanding of network and computer security, security testing, software security
  • knowledge of networks, firewalls, and operating systems
  • both German & English languages at B2/C1 level
  • ability to provide technical advice, guidance, and recommendations to management and other technical specialists on critical information concerning security issues
  • strong analytical skills and ability to collect and interpret data from various sources
  • background in IT/Systems, especially in cloud providers (AWS, GCP, Azure)
  • extensive knowledge of current security threats, techniques, and landscape
  • dedication and self-driven desire for research and learning more about the information security landscape and incident response
  • experience with Windows & *nix platforms
  • strong analytical and critical observation skills
  • will to follow processes and procedures while maintaining the flexibility to “think outside the box”
  • strong written and verbal communication skills
  • collaborative and team focus
  • ability to categorize & prioritize tasks

  • NICE TO HAVE


  • 1+ years of experience in monitoring and analyzing security events and incidents within an organization's IT infrastructure
  • experience with SIEM systems, big data, SOAR platforms and automation processes
  • scripting skillset (Bash, Python, PowerShell) will be considered a plus
  • experience in detecting and responding to cybersecurity incidents
  • industry recognized certifications (CompTia Sec + etc.)
  • If you join us, we offer you:

  • employment based on an employment contract or, if you prefer, in another form
  • opportunities for development and continuous improvement of professional qualifications
  • participation in projects in an international environment
  • access to the newest technologies
  • competitive salary
  • language courses
  • sharing the cost of sport activities
  • private medical care with the possibility of extending it to family members
  • nice working atmosphere in friendly and modern environment


  • In the event of consent to the processing of personal data contained in the job offer for the purposes of future recruitment, please add the following clause (we inform you that the consent expressed may be revoked at any time):


    I consent to the processing of my personal data by BTC Software Systems Sp. z o.o. with its registered office in Poznań (60-166), ul. Grunwaldzka 184, hereinafter referred to as the "Administrator" for the purposes of future recruitment conducted by the Administrator.