Information Security Analyst (all genders)

Salzgitter, DE

Apply now Apply later

With whom you will CELLebrate  

The mission has started. We proudly announce that in our Battery Valley we are starting our own battery cell production and the ramp up of our worldwide headquarters for global cell manufacturing. In this, the tasks and requirements of the unit Information Technology are varied. IT takes care all matters relating to information technology, i.e. electronic data processing. The responsibilities vary from IT-infrastructure to digitization of the organization to the operational use of electronic data processing throughout the organization.

     How you will CELLebrate
  • Monitoring and analyzing security events using SIEM tools
  • Conducting threat hunting and incident response activities
  • Investigation and resolution of security incidents, producing post-incident reports
  • Performing vulnerability assessments and provide remediation guidance
  • Developing and maintaining security dashboards for reporting
  • Ensuring compliance with security frameworks and company policies
  • Proactively identify, analyze, and mitigate emerging security threats
  • Development of custom detection rules for SIEM systems
  • Maintaining incident response playbooks and procedures
  • Performing malware analysis and reverse engineering when necessary
  • Managing endpoint security tools (EDR solutions)
  • Collaboration with other IT teams to investigate suspicious network or endpoint activities
  • Participation in red team/blue team exercises to improve defense capabilities
  • Maintaining up-to-date threat intelligence feeds and apply relevant findings
  • Performing regular penetration testing and vulnerability scanning
     What you need for our CELLebration
  • Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience)
  • 2-5 years of experience in cybersecurity or related roles
  • Proficiency with security monitoring tools (e.g., Splunk0)
  • Familiarity with threat intelligence tools and techniques
  • Knowledge of security frameworks like NIST, CIS, or ISO 27001
  • Certifications (preferred): CompTIA Security+, GIAC Security Essentials, or CEH
     What else can you bring
  • Experience in malware analysis and reverse engineering
  • Knowledge of machine learning applications in threat detection
  • Familiarity with SOAR (Security Orchestration, Automation, and Response) platforms
  • Experience with custom rule creation in SIEMs like Splunk
  • Participation in Capture-the-Flag (CTF) competitions or security research projects
  • Open-source contributions to security tools or communities
  What to look forward to
  • Flexible working hours from 28 to 40h per week
  • Possibility of a 4-day-week (up to 35h per week)
  • 30 days paid + 10 days unpaid leave
  • Mobile work options
  • Relocation support
  • More benefits to come
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  5  1  0
Category: Analyst Jobs

Tags: Automation Blue team CEH Compliance CompTIA Computer Science CTF EDR Endpoint security GIAC Incident response ISO 27001 Machine Learning Malware Monitoring NIST Pentesting Red team Reverse engineering SIEM SOAR Splunk Threat detection Threat intelligence

Perks/benefits: Career development Flex hours Relocation support Team events

Region: Europe
Country: Germany

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.