All positions
SOC Analyst
Department:Tech - Security Engineering
Location:Berlin
About the Opportunity
We are seeking a SOC Analyst to help us manage security incident response and strategically anticipate future threats against our infrastructure.
Our Security Operations Center (SOC) team is at the front line of defense against security threats, working to keep N26 customers' bank accounts safe by detecting and responding to threats in our cloud and on-premise infrastructure.
We believe in proactive security, automation, and continuous improvement to stay ahead of evolving threats.
In This Role, You Will:
- Proactively search for threats, indicators of compromises (IoCs), advanced persistent threats (APTs) and anomalous behavior across the enterprise.
- Develop and execute custom threat hunting hypotheses using threat intelligence, and attack frameworks like MITRE ATT&CK
- Create and maintain detection content (queries, dashboards and alerts)
- Stay current with emerging threats and vulnerabilities
- Contributing to Information Sharing and Analysis Center (ISAC) initiatives
- Use monitoring tools to detect and respond to security alerts.
- Design and build automation for security incident detection and response processes.
- Establish guidelines, standards, and runbooks for teams to respond to incidents and alerts.
- Work with engineering teams to increase log coverage and visibility.
- Perform reactive incident response when security events occur.
What You Need to Be Successful
Background:
- Relevant experience (3-5 years) working in SOC team
- Experience working with SIEMs and familiarity with log formats, and writing SIEM detection rules
- Understanding of monitoring and processing security events at scale.
- Strong knowledge of IT security domains.
- Familiarity with host-based and network-based intrusion detection systems.
- Solid understanding of Linux and ability to write shell scripts.
- Knowledge of vulnerability management and threat hunting
- Knowledge of cyber threat intelligence (CTI) and threat intelligence platform (TIP)
Skills:
- Incident response and threat detection methodologies.
- Familiarity with security frameworks such as MITRE ATT&CK and NIST.
- Strong analytical skills for working with large-scale data and identifying anomalies.
- Knowledge of networking concepts, including firewalls, IDS/IPS, and packet analysis.
- Ability to analyze malware, phishing attempts, and intrusion attempts.
- Scripting and automation skills in Python, Bash, or PowerShell.
- Strong communication skills to document incidents and collaborate with cross-functional teams.
Nice to Haves:
- Software engineering experience in Java, Kotlin, Go, or Python.
- Understanding of cloud environments, ideally AWS.