Information Security Analyst (all genders)
Salzgitter, DE
The mission has started. We proudly announce that in our Battery Valley we are starting our own battery cell production and the ramp up of our worldwide headquarters for global cell manufacturing. In this, the tasks and requirements of the unit Information Technology are varied. IT takes care all matters relating to information technology, i.e. electronic data processing. The responsibilities vary from IT-infrastructure to digitization of the organization to the operational use of electronic data processing throughout the organization.
How you will CELLebrate- Monitoring and analyzing security events using SIEM tools
- Conducting threat hunting and incident response activities
- Investigation and resolution of security incidents, producing post-incident reports
- Performing vulnerability assessments and provide remediation guidance
- Developing and maintaining security dashboards for reporting
- Ensuring compliance with security frameworks and company policies
- Proactively identify, analyze, and mitigate emerging security threats
- Development of custom detection rules for SIEM systems
- Maintaining incident response playbooks and procedures
- Performing malware analysis and reverse engineering when necessary
- Managing endpoint security tools (EDR solutions)
- Collaboration with other IT teams to investigate suspicious network or endpoint activities
- Participation in red team/blue team exercises to improve defense capabilities
- Maintaining up-to-date threat intelligence feeds and apply relevant findings
- Performing regular penetration testing and vulnerability scanning
- Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience)
- 2-5 years of experience in cybersecurity or related roles
- Proficiency with security monitoring tools (e.g., Splunk0)
- Familiarity with threat intelligence tools and techniques
- Knowledge of security frameworks like NIST, CIS, or ISO 27001
- Certifications (preferred): CompTIA Security+, GIAC Security Essentials, or CEH
- Experience in malware analysis and reverse engineering
- Knowledge of machine learning applications in threat detection
- Familiarity with SOAR (Security Orchestration, Automation, and Response) platforms
- Experience with custom rule creation in SIEMs like Splunk
- Participation in Capture-the-Flag (CTF) competitions or security research projects
- Open-source contributions to security tools or communities
- Flexible working hours from 28 to 40h per week
- Possibility of a 4-day-week (up to 35h per week)
- 30 days paid + 10 days unpaid leave
- Mobile work options
- Relocation support
- More benefits to come
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation Blue team CEH Compliance CompTIA Computer Science CTF EDR Endpoint security GIAC Incident response ISO 27001 Machine Learning Malware Monitoring NIST Pentesting Red team Reverse engineering SIEM SOAR Splunk Threat detection Threat intelligence
Perks/benefits: Career development Flex hours Relocation support Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.