Sr. Analyst (2 FTE) (Munster, DU) 23367155-A

Background information

1GNC is a multi-national Headquarter environment where military and civilians work close together (that is exempt from VAT). It contains mainly out of German and Dutch personal. Languages within the HQ (Headquarter) is mandatory English, preferable is also German and/or Dutch. Because of this, the CV has to be delivered in English.

Within the G6 branch: ensuring a reliable, effective, secure and interrupted use of all relevant C2IS and CIS-systems in the PHQ and upon activation during operations. - Additional: Participating in working groups and meetings according to the battle rhythm of 1GNC, acting as information advisor to Chief Information Assurance and as Cyber advisor in the HQ in all aspects of C2 support, CIS, HQ organization as well as information security. The location for this position will be at the HQ 1 GNC (Headquarter), Schlossplatz 15, 48143 Muenster. All tasks related to the job to be executed from 1GNC, Münster, Germany. Candidate should be willing to work in Münster the whole week. Kind request to also try to identify candidates that are already living in Germany, or candidates with a German background. NATO clearances are applicable. Language of instruction is English.

Assignment

Role Local Security Operation center (LSOC) - Analyst Sr Mapping cybersecurity risks and threats from a technical perspective and translating them into products used by 1GNC, by: 

a. Performing threat analysis from a technical perspective;
b. Risk profiling from a technical perspective;
c. Ensure the development and evaluation of technical use cases;
d. Assessing and identifying use cases from a technical perspective;
e. Developing technical use cases and evaluating and proposing improvements;
f. Ensure the development and evaluation of threat and vulnerability mitigation measures
- Assessing and identifying threat books from a technical perspective;
g. Preparation of highly complex threat books.
- Detects cybersecurity vulnerabilities and threats by:
h. Assessment of non-standard change proposals with architecture impact on cybersecurity aspects, including participation in multidisciplinary IM/IT projects;
i. Proactively analyzing and interpreting sources to detect IT phenomena that pose a new threat to the provision of services and documenting the findings;
j. Ensure (real-time) analysis and interpretation of correlated log data and other sources based on known threats;
k. (real-time) Reactive analysis and interpretation of correlated log data and other sources in case of escalation by other analysts.
- Take mitigating measures to address or prevent threats and vulnerabilities of any size and complexity, by: l. Determining the impact of identified threats and vulnerabilities and deciding on mitigation measures to be taken;
m. Commissioning of mitigating measures;
n. Monitoring of mitigation orders issued;
o. Deciding on escalation of vulnerabilities and threats outside the 1GNC;
- Escalating vulnerabilities and threats to NATO/DEU and NLD within the security domain;
p. Acting as security disaster manager during working hours
q. Identifying business impact indicators.
- Ensures the management of the information, data and processes used within 1GNC:
r. Ensuring the operation and quality of the connection of external system content to 1GNC equipment;
s. Ensuring the management of the source data used within 1GNC including asset model and network model;
t. Ensuring the management of the use case database;
u. Ensuring that the relevant processes, procedures and work instructions are kept up to date.
- Contributes to the cybersecurity strategy and policy within 1GNC by:
v. Establishment of technical maintenance and equipment frameworks within 1GNC; 

Mandatory qualifications

  1. Candidate has proven workingexperience in a multi-national environment.
  2. Candidate has proven experience in working in a SOC (Security Operation Center).
  3. Candidate has proven experience in Security Information and Event Management.
  4. Candidate has proven experience in Cyber Incident Management.
  5. Candidate has experience/training/education with SIEM -LOGPoint, Elastic, Splunk.
  6. Candidate has experience with Incident handling processes - Security of critical infrastructures.
  7. Candidate has experience with Cyber Threat intell -MISP -Security Analytics.
  8. Candidate is proficient in English at level 3332.

Desirable qualifications

  1. Knowledge of communications and/or information networks is preferred. 
  2. Certified in Risk and Information Systems Control is preferred.
  3. University Master of Science Cybersecurity and Digital Forensics is preferred. Certified in ITIL is preferred. Cyber Threat intell Course is preferred.
  4. Cisco Certified Network Associate Course. Open-Source Intell Course is preferred.
  5. Proficiency in the German language is preferred.
  6. Knowledge about Incident handling process for an area with inceased security requirements is preferred.
  7. Cisco Certified Network Associate Course. Open-Source Intell Course is preferred.

Reageren Toch opzoek naar iets anders? Bekijk onze andere vacatures.

Contactpersoon

Vragen over de opdracht?

Delen