IT Security Analyst
Start Date: 01/06/2026
End Date: 31/05/2027
Duration: 12 months (full time)
Location: Brussels (Hybrid)
Languages Required: Dutch or French, English
Position Overview:
The L3 SOC Analyst / Detection Engineer will lead advanced cybersecurity incident investigations, support L1 and L2 analysts during escalations, and continuously improve the organization’s detection and response capabilities. This role combines expert-level incident response, proactive threat hunting, and detection engineering to enhance the maturity and effectiveness of the Security Operations Center (SOC).
Key Responsibilities:
- Advanced Incident Response:
- Lead the investigation and resolution of complex and high-severity cybersecurity incidents.
- Support L1 and L2 analysts during incident escalations and provide technical guidance.
- Conduct advanced investigations and root cause analysis.
- Coordinate containment, eradication, and recovery actions with IT and security teams.
- Threat Hunting and Advanced Analysis:
- Perform proactive threat hunting activities using threat intelligence and behavioral analysis.
- Identify attacker tactics, techniques, and procedures (TTPs).
- Analyze malware, phishing campaigns, suspicious behaviors, and advanced attack patterns.
- Detection Engineering:
- Design, develop, test, and maintain SIEM/EDR/XDR detection use cases and correlation rules.
- Improve existing detections to reduce false positives and increase detection fidelity.
- Translate threat intelligence into actionable detection content.
- Validate detection effectiveness through simulations, purple team exercises, and adversary emulation.
- SOC Continuous Improvement:
- Identify gaps in monitoring, detection, and incident response processes.
- Develop and improve SOC playbooks, procedures, and automation capabilities.
- Contribute to SOC reporting, metrics, and operational maturity initiatives.
- Mentor junior analysts and support knowledge sharing across the SOC team.
Required Skills and Experience:
- Autonomous, collaborative, and conscientious work style.
- Experience in detection use case development/improvement.
- Strong communication skills.
- Proficiency in iOS, Linux Red Hat, Microsoft Azure, Microsoft Defender XDR, Microsoft Sentinel.
- Experience with malware analysis, purple teaming, scripting, KQL, Service Now, Splunk, Stamus, vulnerability management, and Windows Server 2016 to present.