Main Duties
- Perform initial analysis of logs and network traffic.
- Determine alert severity and escalate when required.
- Collate information and present findings in a clear, structured format.
- Provide remediation recommendations and first-line response to incidents.
- Conduct research and assessments of security events.
- Analyze events from firewalls, intrusion detection systems, antivirus, and other network sensors.
- Use advanced toolsets (log collection, intrusion detection, packet capture, vulnerability assessment, network devices) to enhance investigations.
- Support end-to-end incident handling processes.
- Contribute to threat intelligence sharing and block list management.
- Propose optimizations and enhancements to maintain and improve security posture.
Required Profile
- University degree in IT or a technical field related to information technology, with at least 1 year of cybersecurity experience.
- Or, if lacking a degree, at least 3 years of relevant cybersecurity experience.
- Strong understanding of computer and communications security principles.
- Knowledge of TCP/IP networking, Windows and Linux operating systems.
- Broad understanding of common network security threats and mitigation techniques.
-
Experience with:
- Security Information and Event Management (SIEM) tools – e.g., Splunk
- Network-based Intrusion Detection Systems (NIDS) – e.g., FirePower, Palo Alto Threat Prevention
- Log analysis from multiple sources: firewalls, proxies, routers, DNS, and other security appliances
- Network traffic capture and analysis using Wireshark
-
Skills:
- Logical and structured approach to complex security investigations
- Ability to analyze large, complex datasets
- Good written and verbal communication skills
- Ability to work independently and as part of a team
-
Desirable Qualifications:
- Leading cybersecurity certifications – e.g., GCIA, GNFA, GCIH
- Experience in CIRT/CERT environments
- Proficiency in intrusion/incident detection and handling
- Experience with full packet capture systems, EDR tools, and computer forensics
- Knowledge of military communication systems and networks
Security Clearance: Required – NATO Secret
Opportunities are numerous. From bare applications development to of IT infrastructures management including conception, architecture and requirements analysis.
Although open to technologies used by our customers, ABAKUS IT-SOLUTIONS seeks mainly but not only consultants mastering: Windows and Linux Servers, networks, developments (JAVA, SAP, .NET,…) as well as highly specialized experts for example in cybersecurity or in Content Management System (CMS) (SharePoint, Drupal, WebLogic…).
In terms of non-technical competencies, ABAKUS IT-SOLUTIONS hires dynamic persons, open to the world, interested by innovation and having a keen sense of client relationship.
A very good command of English is essential, the capacity to speak French, German or Dutch is an asset.
Even though most of our positions require at least 3 years of experience, some are open to new starters.
