
Enable job alerts via email!
Generate a tailored resume in minutes
Land an interview and earn more. Learn more
A leading cybersecurity company in Finland is seeking a Senior Incident Response Investigator to perform investigations, produce high-quality reports, and mentor junior staff. The ideal candidate will have experience with targeted attacks and knowledge of enterprise security architectures. Join a passionate team that values workplace happiness and allows you to define your working methods.
WithSecure delivers research-led cyber security to defend organizations, society and people from real-world attacks and build resilience into their approach. Our people are a mix of technical and creative experts - diverse, talented, and passionate people - working tirelessly to help us advance the industry with new ways of thinking. They lead their own development, in and out of the office. They call the shots when it comes to building a place to call home in our organization.
WithSecure protects businesses all over the world from modern threats. We do this through a Co-security approach born from first-hand knowledge that no one can solve every cyber security problem alone. Every single day, our diverse, growing team fights against online extortion, threats to national infrastructure, the unlawful spread of sensitive information, and everything in-between. The best part about working for WithSecure is our people! We are a community of dedicated and passionate professionals that take workplace happiness seriously. If you\'re looking for something that\'s more than just a job - we\'d love to hear from you.
The role also requires the ability to clearly communicate to a range of audiences from technical practitioners through to executive boards. This requires the ability to identify technical issues and describe them in the language of the business leaders you are engaged with.
A successful candidate should have an experience of both enterprise IT platforms and information security. They will be required to understand the motivations and methods adopted by a wide range of threat sources with a good understanding of how exploitation of systems occurs.
In addition, supporting Incident Readiness activities (such as Tabletop sessions, Client Training, and Playbook creation), when not actively supporting investigations.