Informacje o stanowisku
Do you want to join us on an ambitious mission to secure the digital world? Keepit is looking for a Senior SOC Analyst (SOC L3 Analyst) to join our Security Operation Center in Krakow, Poland.
A fair and transparent recruitment process
During the recruitment process, you can expect the following stages:
CV screening, Recruitment interview, feedback review, Technical interview, and Final interview.
You will be assessed according to the criteria below:
Technical Skills:
- Incident Response: Proficient in investigating, analyzing, and mitigating complex security incidents.
- Threat Hunting: Hands-on experience with proactive threat-hunting methodologies and tools.
- Forensic Analysis: Skills in endpoint, network, and memory forensic investigations.
- Malware Analysis: Capable of conducting static and dynamic malware analysis.
- SIEM Mastery: In-depth knowledge of SIEM platforms (e.g., MS Sentinel, Elastic, Wazuh, including rule creation, query optimization, and reporting.
- Automation: Familiarity with SOAR platforms and scripting (Python, Bash, PowerShell) for automating routine tasks.
- Cloud Security: Understanding of securing cloud environments (Azure) and detecting cloud-based threats.
- Threat Intelligence: Ability to operationalize threat intelligence and correlate indicators with incidents.
Soft Skills: - Analytical and Problem-Solving Skills: A systematic approach to identifying and resolving complex issues.
- Leadership: Ability to mentor junior team members and provide technical guidance.
- Teamwork and Collaboration: Proven ability to work effectively in cross-functional teams.
- Communication Skills: Capability to communicate technical details clearly to non-technical stakeholders.
Language: - English is a preferred language, and we expect you to be fluent in it, both written and spoken.
Logical Thinking: - Structured Problem Solving: Ability to break down complex security issues into actionable steps.
- Decision-Making Skills: Making informed and reasoned decisions under pressure.
- Pattern Recognition: Identifying unusual patterns and behaviours in data or systems.
- Scenario-Based Thinking: Proficiency in simulating and analyzing hypothetical threat scenarios.
We offer:
- Official employment – Umowa o pracę contract
- 4 additional working days of vacation leave per full calendar year
- 3 days of internal sick leave without a doctor`s note
- Health and Life Insurance
- Employee Capital Plan (PPK)
- Multisport card compensation
- Coverage of professional training sessions, meetups, etc.
- English-speaking club with native speakers
- Polish language classes
- Internet and Glasses reimbursement
- Cosy office in Krakow city centre (Długa, 72) with beverages, fruit, and cookies
- Winter and summer parties, events, team-buildings
We kindly ask you not to provide us with any sensitive categories of personal data when applying for a job with us. When applying for the vacancy, Keepit will process your personal data, and therefore we recommend that you also read our privacy policy at keepit.com/privacy-policy/, which describes our processing of personal data and your rights as a data subject.
- 4+ years of experience in SOC environments or equivalent
- Obligatory expertise in SIEM solutions (MS Sentinel, Elastic SIEM, Wazuh) with demonstrated ability to create, optimize, and manage rules
- Hands-on experience with malware analysis, reverse engineering, and forensics.
- Advanced knowledge of incident response frameworks (NIST, SANS) and tools (e.g., EDR, IDS, IPS, centralized antivirus etc)
- Strong knowledge of security standards (ISO 27001, NIST) and ability to map them to incident handling procedures
- Leadership and mentorship skills, with a proven track record of training and upskilling junior analysts
- Relevant certifications: CSA, CISSP, GIAC, OSCP, CEH, or equivalent will be an advantage
Do you want to join us on an ambitious mission to secure the digital world? Keepit is looking for a Senior SOC Analyst (SOC L3 Analyst) to join our Security Operation Center in Krakow, Poland.
A fair and transparent recruitment process
During the recruitment process, you can expect the following stages:
CV screening, Recruitment interview, feedback review, Technical interview, and Final interview.
You will be assessed according to the criteria below:
Technical Skills:
- Incident Response: Proficient in investigating, analyzing, and mitigating complex security incidents.
- Threat Hunting: Hands-on experience with proactive threat-hunting methodologies and tools.
- Forensic Analysis: Skills in endpoint, network, and memory forensic investigations.
- Malware Analysis: Capable of conducting static and dynamic malware analysis.
- SIEM Mastery: In-depth knowledge of SIEM platforms (e.g., MS Sentinel, Elastic, Wazuh, including rule creation, query optimization, and reporting.
- Automation: Familiarity with SOAR platforms and scripting (Python, Bash, PowerShell) for automating routine tasks.
- Cloud Security: Understanding of securing cloud environments (Azure) and detecting cloud-based threats.
- Threat Intelligence: Ability to operationalize threat intelligence and correlate indicators with incidents.
Soft Skills: - Analytical and Problem-Solving Skills: A systematic approach to identifying and resolving complex issues.
- Leadership: Ability to mentor junior team members and provide technical guidance.
- Teamwork and Collaboration: Proven ability to work effectively in cross-functional teams.
- Communication Skills: Capability to communicate technical details clearly to non-technical stakeholders.
Language: - English is a preferred language, and we expect you to be fluent in it, both written and spoken.
Logical Thinking: - Structured Problem Solving: Ability to break down complex security issues into actionable steps.
- Decision-Making Skills: Making informed and reasoned decisions under pressure.
- Pattern Recognition: Identifying unusual patterns and behaviours in data or systems.
- Scenario-Based Thinking: Proficiency in simulating and analyzing hypothetical threat scenarios.
We offer:
- Official employment – Umowa o pracę contract
- 4 additional working days of vacation leave per full calendar year
- 3 days of internal sick leave without a doctor`s note
- Health and Life Insurance
- Employee Capital Plan (PPK)
- Multisport card compensation
- Coverage of professional training sessions, meetups, etc.
- English-speaking club with native speakers
- Polish language classes
- Internet and Glasses reimbursement
- Cosy office in Krakow city centre (Długa, 72) with beverages, fruit, and cookies
- Winter and summer parties, events, team-buildings
We kindly ask you not to provide us with any sensitive categories of personal data when applying for a job with us. When applying for the vacancy, Keepit will process your personal data, and therefore we recommend that you also read our privacy policy at keepit.com/privacy-policy/, which describes our processing of personal data and your rights as a data subject.
,[Act as a senior incident responder for escalated security incidents, Develop and optimize SIEM rules, fine-tuning alerts to reduce false positives, Create and maintain playbooks for incident handling and ensure knowledge transfer to manager analysts, Working on connecting new log sources, log optimization, and parsing., Perform threat hunting, root cause analysis, and forensics, Provide mentorship and training to L1 analysts to enhance SOC capabilities., Lead incident response efforts and coordinate across IT, security, and management teams, Act as a spare SOC engineer Requirements: security operation, SIEM solutions, malware analysis, reverse engineering, forensics, incident response, security standards, mentorship , threat hunting, certifications Additionally: Private healthcare, Life insurance, Full Multisport card compensation, Employee Capital Plan (PPK), 4 additional days of vacation, Training budget, Events and team-buildings, Free coffee, Free snacks, Free beverages, No dress code, Modern office, Bike parking.
Praca KrakówKraków - Oferty pracy w okolicznych lokalizacjach