Cyber Security Analyst

EUR 26,400-60,000 per year
MIDDLE
✅ Hybrid

SCRAPED

Used Tools & Technologies

Not specified

Required Skills & Competences ?

Security @ 3 Go @ 3 Python @ 3 Communication @ 6 Data Engineering @ 3 PowerShell @ 3

Details

At Nord Security, we're creating a safer cyber future.

We help people and businesses take back control of their online security, privacy, and data. From VPNs to password managers, threat intelligence to eSIMs for travel—our teams turn complex problems into solutions trusted by millions worldwide.

Life is online. In this role, you'll help people own it.

Responsibilities

  • Monitor security alerts and events from various sources, including SIEM, IDS/IPS, and endpoint protection systems, to identify potential security incidents
  • Conduct proactive threat hunting exercises using various techniques, tools, and intelligence sources to identify and mitigate advanced threats that may go undetected by traditional security measures
  • Analyze network traffic, logs, and other relevant data to identify indicators of compromise (IoCs) and patterns of suspicious behavior
  • Collaborate with incident response teams to investigate and respond to security incidents, including containment, eradication, and recovery efforts
  • Develop and maintain threat profiles, playbooks, and detection rules to enhance the organization's threat hunting capabilities
  • Stay up-to-date with the latest cyber threats, attack techniques, and vulnerabilities to effectively anticipate and defend against emerging risks
  • Generate detailed reports and documentation of threat hunting activities, findings, and recommended mitigation strategies
  • Provide expert-level support and guidance to junior members of the security team and promote knowledge sharing within the team
  • Data engineering focus: Implement processes and tools to monitor and ensure the accuracy, completeness, and consistency of security data, identifying and resolving data discrepancies that could impact threat detection
  • Playbook management focus: Design, document, and continuously improve detailed incident response playbooks for various security incidents, ensuring clear, actionable steps for detection, analysis, containment, eradication, and recovery

Requirements

  • Familiarity with security tools such as SIEM, IDS/IPS, endpoint detection and response (EDR) systems, and threat intelligence platforms
  • Proficiency in analyzing network traffic, logs, and various data sources to identify and investigate security incidents
  • Strong knowledge of common attack techniques, malware families, and IoC patterns
  • Experience with scripting and programming languages (e.g., Python, PowerShell) for automating threat hunting processes is advantageous
  • Data engineering focus: Experience with security data collection and analysis within cloud environments
  • Playbook management focus: Strong understanding of workflow design principles, state machines, and conditional logic to create efficient and resilient automated playbooks
  • Problem-solving skills and the ability to think creatively to identify signs of advanced threats
  • Strong communication skills, with the ability to convey complex technical findings to both technical and non-technical stakeholders
  • Ability to work collaboratively in cross-functional teams and adapt to a dynamic and fast-paced environment
  • Strong analytical mindset and attention to detail, with the ability to stay organized while managing multiple tasks

Salary

Gross Salary 2200 - 5000 EUR/Month.