ALTEN Stockholm is now looking for you who finds cyber security thrilling!
Personal characteristics that we value here at ALTEN is your ability to act independently and commercial. You are positive, outgoing and driven with the ability to create and maintain good relations with our customers. You are a problem solver and you have the ability to use your creativity to find new solutions.
You will be responsible for cyber security development and for implementing that into an organization. The aim of the work is to take a product to a higher level of cyber security. It is required that you have been working with cyber security before and that you have deep knowledge and understanding within this field.
You need to have a high analytical ability to identify existing and potential risks and for those risks lead threat analyses, define the risks and formulate the requirements to avoid them.
Strong Knowledge in C \C++ \ Python
Bachelor of Science in Computer Science, Computer Engineering, Mathematic, Information Security or any related fields.
In lieu of these education requirements at least 2 years of experience in Security Operations Centers or Cyber Security Incident Response Teams.
Thorough understanding of fundamental security and network concepts (Operating systems, intrusion / detection, TCP / IP, ports, etc.
Programming skills (e.g. Python, Java, etc.).
Good English skills, both written and spoken (Swedish will be a plus).
Security certifications (Security+, GCIA, GCIH, GREM, CISSP, CEH, GCFA, etc.)
Experience with ArcSight / Splunk / FireEye or other security products desired.
Experience managing cases with enterprise SIEM or Incident Management systems.
Experience supporting network investigations.
Experience with network monitoring in a SOC environment desired.
Working experiences with SIEM, Network IPS, endpoints, proxy, email gateway, anti-virus, firewalls.
Knowledge of vulnerability assessment and PCI DSS.
Ability to automatic tasks with Powershell (or any other programming languages) will be a plus.
Your to do-list includes
Monitor logging environments for security events and alerts to potential (or active) threats, intrusions, and/or compromises.
Responsible for understanding the global threat landscape and acting on threat intelligence.
Assists with containment of threats and remediation of environment during or after an incident.
Documents event analysis.
Conduct IT security incident response in support of a cyber team, following industry standards of containment, eradication, recovery and lessons learned.
Investigate spam and malicious e-mail reported by internal users.
Perform analysis on threat indicators (e.g. zero-day, phishing campaign, targeted attack, etc.) and intelligent insight. Identify the impact of vulnerabilities against the whole network infrastructure.
Perform forensic on an ad-hoc basis. (e.g. mailbox examination, memory forensic, disk forensic for Indicators of Compromise, etc.).
Perform co-relational analysis on various security / network solutions (e.g. such as Network IPS, endpoints, proxy, email gateway, anti-virus, firewalls, etc.).
For more information about the position, contact Daniel Strand, Junior Talent Acquisition Partner at [email protected].