Company Description
ZENDATA is a leading player in the cybersecurity industry, offering services such as complete,
fully-managed cyber protection, vulnerability assessment, pen testing, and red teaming. With
locations in Geneva, Dubai, and Bahrain, ZENDATA provides services to clients globally and
collaborates with law enforcement authorities and threat intelligence companies. As an official
cybersecurity expert of the Swiss federal government, ZENDATA’s expertise is recognized by
institutions, businesses, and the media.
Role Description
This is a full-time on-site role as a senior Detection and Response Analyst in our Security
Operations Center (SOC) Team located in Geneva. The role will be part of a team of SOC analysts
of our ZEN360 Detection & Response environment to detect, respond to, mitigate, and report on
cybersecurity incidents. The role will also be responsible for cyber forensics and performing
threat-hunting activities.
Primary Responsibilities
• Monitor, protect, and defend MSSP clients against malicious network traffic.
• Monitor, protect, and defend internal networks and hosts against ongoing and emerging
threats.
• Enrich monitoring logs with contextual operation data from functional areas to correlate
events and identify security issues, threats, and vulnerabilities
• Conduct security event analysis and validation, triage validated incidents, perform initial
containment where feasible, research incidents and enrich incident case documentation,
and escalate incidents for further analysis, containment, and eradication.
• Review and analyze threat intelligence information and proactively search applications,
systems, and network logs to hunt for and thwart relevant threats identified threats.
• Contribute to the development and maintenance of playbooks to establish and
continuously improve the team’s operating knowledge base.
• Participate in post-incident activities and contribute to lessons learned to improve
security operations.
• Provide support in the preparation of management threat reports briefings, and
recommendations.
• Provide sound technical recommendations that enable remediation of security issues.
• Utilize advanced threat models, SIEM use cases, and incident response playbooks.
• Provide guidance and mentorship to improve analyst skill sets guiding threat
management and modeling, identify threat vectors, and develop use cases for security
monitoring.
Qualifications
• Bachelor’s Degree in an IT-related field and 4+ years’ experience in an information
technology field with a minimum of 3 years of experience in the areas of incident
detection and response, malware analysis, or computer forensics.
• Excellent knowledge of cybersecurity protocols and procedures.
• Experience with SIEM technologies (such as Elastic or Splunk) and other security tools.
• Strong analytical and problem-solving skills and attention to detail.
• Excellent communication and interpersonal skills, be able to effectively communicate
security concepts and protections to technical and non-technical audiences.
• Relevant certifications in Blue Teaming and Forensics.
We also place a strong emphasis on a candidate’s willingness to learn, adapt, and take on new
challenges.
The position willrequire work on non-regular working hours shifts and on-call schedules

Apply for this position

Allowed Type(s): .pdf, .doc, .docx