Enable job alerts via email!

Information Security Engineer - SOC Service Coordinator (f/m/d)

Deutsche Börse Group

United States

Remote

USD 80,000 - 120,000

Full time

Today
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in the financial sector is seeking an Information Security Engineer to enhance their SOC operations. The role involves improving SOC runbooks, managing SIEM alerts, and collaborating with cross-functional teams to mitigate cyber threats. Ideal candidates will have strong experience in cybersecurity, excellent problem-solving skills, and a commitment to maintaining high standards in incident management.

Qualifications

  • Solid experience in a CERT or SOC team with SIEM alert handling.
  • Knowledge of cyber threats and vulnerabilities.
  • Fluent in spoken and written English; proficiency in German is a plus.

Responsibilities

  • Identify and propose improvements on SOC runbooks.
  • Engage with internal IT functions to fill gaps in alert handling.
  • Participate in Blue/Red team exercises.

Skills

Problem-solving
Team collaboration
Report writing

Education

Relevant industry certifications (e.g., SANS/GIAC, CompTIA)

Tools

SIEM
SOAR solutions
Python
Shell scripting

Job description

Information Security Engineer - SOC Service Coordinator (f/m/d)

DBG CERT is looking for a highly motivated Security Engineer whose responsibility will be to ensure that the initial triage and analysis of cyber threats, reported by our SIEM solution to SOC L1 and L2 analysts, is performed in a timely fashion and in accordance with DBG quality standards as well as with regulators' requirements and contractual agreements (e.g., SLA response/resolution time) with our internal customers. At this position, you will also be responsible for identifying and proposing improvements on SOC/CERT runbooks as well as tuning of SIEM use cases to reduce the risks of false positives, false negatives, and hence improve incident management escalation and handling.

Your responsibilities:

  1. Identify and propose adjustments/improvements on SOC runbooks based on false positives, tuning of SIEM use cases, and audit findings.
  2. Engage with internal IT functions to fill identified gaps (e.g., lack of details in asset inventory) in the alert handling process.
  3. Identify and propose adjustments/improvements on SIEM use cases based on false positives reported by SOC and audit findings.
  4. Perform quality checks and end-to-end testing of SOC runbooks.
  5. Prepare for audits (evidence/requests handling) and attend audit sessions.
  6. Participate in regular calls with the SOC Service Manager.
  7. Participate in Blue/Red team exercises to test and improve monitoring and response capabilities.

Your profile:

  1. Solid experience in a CERT or SOC team with SIEM alert handling, workflow design, and runbook preparation.
  2. Knowledge of cyber threats and vulnerabilities: how to properly identify, triage, and remediate threats based on threat intelligence and analysis of security events, log data, and network traffic.
  3. Expert working knowledge of technical and organizational aspects of information security, through prior defensive or offensive work experience.
  4. Solid understanding of cyber threats and the MITRE ATT&CK framework.
  5. Deliverable-oriented, with strong problem-solving skills and adaptability in complex and highly regulated environments.
  6. Team player willing to cooperate with colleagues across multiple locations in a cross-cultural environment.
  7. Good report-writing skills to present findings of investigations.
  8. Availability during working hours (Mon-Fri) plus on-call duty.
  9. Fluent in spoken and written English, including security terminology; proficiency in German is a plus.

Strong assets:

  1. Willingness and ability to lead complex cybersecurity investigations supporting the CERT lead.
  2. Experience in developing automation of CERT/SOC processes via SOAR solutions.
  3. Experience with Red Teaming and Purple Teaming exercises.
  4. Background in Malware Analysis, Digital Forensics, and Cyber Threat Intelligence.
  5. Experience in Threat Hunting, leveraging intelligence data to proactively identify and investigate suspicious behavior.
  6. Script development skills (e.g., Python, Shell scripting).
  7. Cloud security expertise, primarily in GCP and Azure.
  8. Vulnerability handling and management.
  9. Relevant industry certifications such as SANS/GIAC (e.g., GCIA, GCIH, GNFA, GCFA), CompTIA (Security+, Cloud+, PenTest+), OSCP, eLearnSecurity are desirable.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Service Lead SAP Solution Architect - SAP S/4 (f/m/d)

Freudenberg

Remote

USD 90.000 - 150.000

11 days ago

Beverage Equipment Service Tech Lead

Pepsi Bottling Ventures LLC

Harrisburg

On-site

USD 80.000 - 100.000

8 days ago

Senior Client Manager Energieversorger / Service Provider (f/m/d)

NTT

Remote

USD 60.000 - 100.000

30+ days ago

Project & Process Safety Engineer

West Fraser

Cordova

On-site

USD 75.000 - 100.000

2 days ago
Be an early applicant

Central Services Manager (M/F/D)*

TGW Logistics

Grand Rapids

Remote

USD 70.000 - 110.000

19 days ago

Sr Information Security Engineer

Pacific Life Insurance

Remote

USD 110.000 - 136.000

30+ days ago

Principal Systems Safety Engineer Phoenix, AZ

Real Time Consulting, LLC

Phoenix

On-site

USD 80.000 - 120.000

14 days ago

Director of Client Services – Wastewater

27 Structural Technologies Solutions, LLC

Columbia

Remote

USD 80.000 - 150.000

30+ days ago

Manager, Healthcare Services (Remote)

Lensa

West Valley City

Remote

USD 77.000 - 172.000

30+ days ago