Ref: #63749
Senior Cyber Security Incident Responder
Job Title: Digital Forensics Incident Response (DFIR) / SOC Analyst
Location: Paris Contract length: 12+ months
Hybrid working: 2 days a week on site, 3 days remote
About Us: My customer is dedicated to safeguarding the digital landscapes from cyber threats. Our team is passionate about leveraging cutting-edge technology and innovative solutions to deliver top-notch security services. We’re looking for a skilled DFIR/SOC Analyst to join our dynamic team and play a crucial role in protecting our organization and clients from emerging cyber threats.
Position Overview: As a DFIR/SOC Analyst, you will be at the forefront of our cybersecurity operations, responsible for detecting, analyzing, and responding to security incidents. You will utilize your expertise in digital forensics and incident response to investigate and mitigate threats, ensuring the integrity and security of our digital assets.
Key Responsibilities:
• Incident Detection and Response: Monitor security alerts, investigate potential security incidents, and respond promptly to mitigate threats.
• Digital Forensics: Conduct in-depth forensic analysis of compromised systems to uncover evidence, understand attack vectors, and support remediation efforts. • Log Analysis: Analyze security logs and data to identify anomalies, patterns, and potential security breaches.
• Threat Intelligence: Stay updated on the latest threat intelligence and trends to anticipate and prepare for emerging threats.
• Documentation and Reporting: Create detailed incident reports, document forensic findings, and present analysis to stakeholders.
• Collaboration: Work closely with other cybersecurity teams, IT departments, and external partners to coordinate incident response efforts.
• Continuous Improvement: Contribute to the development of incident response plans, playbooks, and security policies to enhance our security posture.
Qualifications:
• Experience: 2+ years of experience in cybersecurity, with a focus on digital forensics and incident response.
• Technical Skills: Proficiency in forensic tools SIEM platforms (e.g., Splunk, QRadar), and network analysis tools.
• Knowledge: Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
• Certifications: Relevant certifications such as CEH, CISSP, CCFP, GCFA, GIAC, SANS 508 are preferred.
• Analytical Skills: Excellent problem-solving skills with the ability to analyze complex data and provide actionable insights.
• Communication: Strong written and verbal communication skills with the ability to explain technical concepts to non-technical stakeholders.
• Team Player: Ability to work effectively in a team environment and collaborate across departments