All positions
SOC Analyst
Department:Security
Location:Berlin
About the Opportunity
We are seeking a SOC Analyst to help us manage security incident response and strategically anticipate future threats against our infrastructure.Our Security Operations Center (SOC) team is at the front line of defense against security threats, working to keep N26 customers' bank accounts safe by detecting and responding to threats in our cloud and on-premise infrastructure. We believe in proactive security, automation, and continuous improvement to stay ahead of evolving threats.In This Role, You Will:
- Proactively search for threats, indicators of compromises (IoCs), advanced persistent threats (APTs) and anomalous behavior across the enterprise.
- Develop and execute custom threat hunting hypotheses using threat intelligence, and attack frameworks like MITRE ATT&CK
- Create and maintain detection content (queries, dashboards and alerts)
- Stay current with emerging threats and vulnerabilities
- Contributing to Information Sharing and Analysis Center (ISAC) initiatives
- Use monitoring tools to detect and respond to security alerts.
- Design and build automation for security incident detection and response processes.
- Establish guidelines, standards, and runbooks for teams to respond to incidents and alerts.
- Work with engineering teams to increase log coverage and visibility.
- Perform reactive incident response when security events occur.
What You Need to Be Successful
Background:- Relevant experience (3-5 years) working in SOC team
- Experience working with SIEMs and familiarity with log formats, and writing SIEM detection rules
- Understanding of monitoring and processing security events at scale.
- Strong knowledge of IT security domains.
- Familiarity with host-based and network-based intrusion detection systems.
- Solid understanding of Linux and ability to write shell scripts.
- Knowledge of vulnerability management and threat hunting
- Knowledge of cyber threat intelligence (CTI) and threat intelligence platform (TIP)
- Incident response and threat detection methodologies.
- Familiarity with security frameworks such as MITRE ATT&CK and NIST.
- Strong analytical skills for working with large-scale data and identifying anomalies.
- Knowledge of networking concepts, including firewalls, IDS/IPS, and packet analysis.
- Ability to analyze malware, phishing attempts, and intrusion attempts.
- Scripting and automation skills in Python, Bash, or PowerShell.
- Strong communication skills to document incidents and collaborate with cross-functional teams.
- Software engineering experience in Java, Kotlin, Go, or Python.
- Understanding of cloud environments, ideally AWS.
What’s in it for you:
- Accelerate your career growth by joining one of Europe’s most talked about disruptors 🚀.
- Employee benefits that range from a competitive personal development budget, work from home budget, discounts to fitness & wellness memberships, language apps and public transportation.
- As an N26 employee you will have access to a Premium subscription on your personal N26 bank account. As well as subscriptions for friends and family members.
- Additional day of annual leave for each year of service.
- A high degree of autonomy and access to cutting edge technologies - all while working with a friendly team of peers of diverse nationalities, life experiences and family statuses.
- A relocation package with visa support for those who need it.