logo

Bekijk alle vacatures

IT Security Analyst

Brussel, Brussel

IT Security Analyst

Start Date: 01/06/2026

End Date: 31/05/2027

Duration: 12 months (full time)

Location: Brussels (Hybrid)

Languages Required: Dutch or French, English

Position Overview:

The L3 SOC Analyst / Detection Engineer will lead advanced cybersecurity incident investigations, support L1 and L2 analysts during escalations, and continuously improve the organization’s detection and response capabilities. This role combines expert-level incident response, proactive threat hunting, and detection engineering to enhance the maturity and effectiveness of the Security Operations Center (SOC).

Key Responsibilities:

  • Advanced Incident Response:
    • Lead the investigation and resolution of complex and high-severity cybersecurity incidents.
    • Support L1 and L2 analysts during incident escalations and provide technical guidance.
    • Conduct advanced investigations and root cause analysis.
    • Coordinate containment, eradication, and recovery actions with IT and security teams.
  • Threat Hunting and Advanced Analysis:
    • Perform proactive threat hunting activities using threat intelligence and behavioral analysis.
    • Identify attacker tactics, techniques, and procedures (TTPs).
    • Analyze malware, phishing campaigns, suspicious behaviors, and advanced attack patterns.
  • Detection Engineering:
    • Design, develop, test, and maintain SIEM/EDR/XDR detection use cases and correlation rules.
    • Improve existing detections to reduce false positives and increase detection fidelity.
    • Translate threat intelligence into actionable detection content.
    • Validate detection effectiveness through simulations, purple team exercises, and adversary emulation.
  • SOC Continuous Improvement:
    • Identify gaps in monitoring, detection, and incident response processes.
    • Develop and improve SOC playbooks, procedures, and automation capabilities.
    • Contribute to SOC reporting, metrics, and operational maturity initiatives.
    • Mentor junior analysts and support knowledge sharing across the SOC team.

Required Skills and Experience:

  • Autonomous, collaborative, and conscientious work style.
  • Experience in detection use case development/improvement.
  • Strong communication skills.
  • Proficiency in iOS, Linux Red Hat, Microsoft Azure, Microsoft Defender XDR, Microsoft Sentinel.
  • Experience with malware analysis, purple teaming, scripting, KQL, Service Now, Splunk, Stamus, vulnerability management, and Windows Server 2016 to present.

 

Deel deze vacature

Powered by