SOSi

Cyber Incident Handling Analyst

SOSi Wiesbaden

Stellenbeschreibung:

Overview

SOSi is seeking a Cyber Incident Handling Analyst to support our customer in Wiesbaden, Germany . The Cyber Incident Handler will perform analytic analysis of cyber related events to detect and deter malicious actors using SIEM technologies, which correlate multiple security tool alerts and logs.

Essential Job Duties

  • Work as a member of the Cyber Incident Response Operations Team to increase the security posture of the customers' network.
  • Monitor SIEM platforms for alerts, events, and rules providing insight into malicious activities and/or security posture violations.
  • Review intrusion detection system alerts for anomalies that may pose a threat to the customers' network.
  • Identify and investigate vulnerabilities, assess exploit potential and suggest analytics for automation in the SIEM engines.
  • Report events through the incident handling process of creating incident tickets for deeper analysis and triage activities.
  • Coordinate and distribute directives, vulnerability, and threat advisories to identified consumers.
  • Issue triage steps to local touch labor organizations and Army units to mitigate or collect on-site data.
  • Perform post intrusion analysis to determine shortfalls in the incident detection methods.
  • Develop unique queries and rules in the SIEM platforms to further detection for first line cyber defenders.
  • Monitor the status of the intrusion detection system for proper alert reporting and system status.
  • Respond to the higher headquarters on incidents and daily reports.
  • Provide daily updates to Defensive Cyber Operations staff on intrusion detection operation and trends of events causing incidents.
  • Prepare charts and diagrams to assist in metrics analysis and problem evaluation and submit recommendations for data mining and analytical solutions.
  • Draft reports of vulnerabilities to increase customer situational awareness and improve the customers cyber security posture.
  • Assist all sections of the Defensive Cyber Operations team as required in performing Analysis and other duties as assigned.
  • May perform documentation and vetting of identified vulnerabilities for operational use.
  • May prepare and present technical reports and briefings.
  • Utilize a solid understanding of networking ports and protocols, their uses, and their potential misuses.

Minimum Requirements

  • An active in scope Top Secret/SCI clearance is required.
  • Bachelor in related discipline +3, AS +7, major certification +7 or 11+ years specialized experience.
  • Must meet DoD 8140 DCWF 531 requirements (B.S., A- , A- , A- , A , WSS 011, WSS 012GCFA, CBROPS, FITSP-O, GISF, CCSP, CEH, Cloud+, GCED, PenTest+, Security+, or GSEC).
  • Must meet DoD 8140 DCWF 511 requirements (B.S., M03385G; M10395B; M22385, A- , A- , A- , A- , A- , A- , A- , WSS 011, DISA-US1377, GFACT, GISF, Cloud+, GCED, PenTest+, Security+, or GSEC).
  • Must have one of the following certifications (Cisco CyberOps Professional, GCED, GCFA, GCFE, GCIH, GNFA, DCITA CIRC, FIWE or Offensive Security OSDA).
  • Must have a full, complete, and in-depth understanding of all aspects of Defensive Cyber Operations.
  • Must have a good breadth of knowledge of common ports and protocols of system and network services.
  • Experience in packet captures and analyzing a network packet.
  • Experience with intrusion detection systems such as Snort, Suricata, and/or Zeek.
  • Experience with SIEM systems such as Splunk and/or ArcSight.
  • Must have the demonstrated ability to communicate with a variety of stakeholders in a variety of formats.
  • Must be able to obtain certification as a Technical Expert by the German Government under the Technical Expert Status Accreditation (TESA) process.

Preferred Qualifications

  • Bachelors degree in Engineering, Computer Science, or Mathematics.
  • Experience with writing Snort or Suricata IDS rules.
  • Experience with writing complex Splunk SPL queries to correlate lookup tables with event logs to identify anomalies.
  • Experience with analyzing packets using Arkime or Wireshark.
  • Experience with Microsoft Windows event IDs.
  • Experience with Linux audit log analysis.
  • Familiarity with Git and VScode.
  • Experience with one or more scripting languages such as PowerShell, Bash, Python.

Work Environment

  • Normal office conditions.
  • Potential to work on multiple shifts in a rotation schedule covering a 24/7/365 mission.
  • On site in Wiesbaden, Germany.

Working at SOSi

All interested individuals will receive consideration and will not be discriminated against for any reason.

#J-18808-Ljbffr
NOTE / HINWEIS:
EnglishEN: Please refer to Fuchsjobs for the source of your application
DeutschDE: Bitte erwähne Fuchsjobs, als Quelle Deiner Bewerbung

Stelleninformationen

  • Veröffentlichungsdatum:

    13 Dez 2025
  • Standort:

    Wiesbaden
  • Typ:

    Vollzeit
  • Arbeitsmodell:

    Vor Ort
  • Kategorie:

  • Erfahrung:

    2+ years
  • Arbeitsverhältnis:

    Angestellt

KI Suchagent

AI job search

Möchtest über ähnliche Jobs informiert werden? Dann beauftrage jetzt den Fuchsjobs KI Suchagenten!

Diese Jobs passen zu Deiner Suche:

Aareal Bank AG
IT Architekt (w/m/d)
Aareal Bank AG
Vollzeit Wiesbaden
19 Dez 2025Development & IT
Liebherr-EMtec GmbH
IT Business Analyst Production (m/w/d)
Liebherr-EMtec GmbH
Vollzeit Dettingen a.d. Iller
20 Dez 2025
Liebherr-IT Services GmbH
Product Cyber Security Manager (m/f/x)
Liebherr-IT Services GmbH
Vollzeit Kellmünz
16 Dez 2025
Sparkasse Ulm
Analyst/-in (m/w/d) Kreditabwicklung
Sparkasse Ulm
Vollzeit Ulm
20 Dez 2025
REWE Group
Digital Analyst
REWE Group
Vollzeit Frankfurt am Main
20 Dez 2025
company logo
Video Content Analyst
FH Collective - Academy
Vollzeit Berlin
20 Dez 2025
KraussMaffei
Cyber Defense Lead
KraussMaffei
Vollzeit Bad Berka
20 Dez 2025
Dirk Rossmann GmbH
Business Analyst (m/w/d) IAM
Dirk Rossmann GmbH
Vollzeit
20 Dez 2025