Opdrachten
Info
Functie
Security Analyst CSIRTLocatie
VeldhovenUren per week
40 uren per weekLooptijd
02.08.2023 - 02.08.2024Opdrachtnummer
140001Sluitingsdatum
Are you an experienced Cyber Analyst with a passion for IT Security and a curiosity how things work, we are looking for you to join our growing Cyber Defense Incident Response team as a temporary backfill for a long term absence in the team for 3-6 months..
Introduction
ASML brings together the most creative minds in science and technology to develop lithography machines that are key to producing faster, cheaper, more energy-efficient microchips. We design, develop, integrate, market and service these advanced machines, which enable our customers - the world’s leading chipmakers – to reduce the size and increase the functionality of their microchips, which in turn leads to smaller, more powerful consumer electronics.
The Cyber Defense Center (CDC) within ASML (Veldhoven office) minimizes the damage caused by threat actors bypassing ASML preventative security controls through real time detection & response and therefore protecting ASML assets. By constantly acting on alerts, improving and adapting our monitoring controls we enable ASML to operate in an increasingly hostile environment. We work closely together with other security functions and other ASML teams utilizing our shared in depth knowledge in this effort to secure the business for all our stakeholders. To improve our Incident Response services we are looking for a skilled professional in this area to complement and support our growing team.
Job Mission
You will continually watch and respond to security alerts (triage) and work with the Security Operations Center in escalations of notable incidents. You participate in continuous process improvements in order to keep up with the developing threat landscape.
Your responsibilities
Respond to medium and high priority incidents by going through the incident lifecycle
Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
Carry out the Duty Officer role & CSIRT second line standby role on a periodic basis
Create and optimize playbooks and workflows both for the SOC and for the CSIRT
Support in the design and configuration of new incident response and investigative capabilities
Help in identifying maturity gaps and lack of coverage in current capabilities and define plans for remediation
Coach and provide guidance to L1 analysts
Support in the development of threat management capability roadmaps
Level of education
Bachelor or Master’s degree in cyber security, Computer science or equivalent combination of education and work experience
Experience
2-3 years of experience working in an analyst/incident responder role within an enterprise environment able to handle more complex incidents end to end yourself.
Skills
Ability to take decisive action based on available information in a timely manner;
Ability to research and characterize security threats to include identification and classification of threat indicators;
Critical thinking and contextual analysis abilities;
Investigative and analytical problem solving skills;
Teamwork, can-do mentality;
Stress resistant and natural multi-tasker
Strong time management skills and willing to go above and beyond where required
Teaching and coaching ambition for junior team members
Knowledge on
Host forensics, network forensics, log analysis and malware (static/dynamic analysis) triage
Security ticketing systems and basic SOC procedures
Security tools e.g. log management tools, endpoint and network security controls
Networking concepts, including TCP/IP protocols and network topology
Proficient with scripting programming e.g. Bash, PowerShell, Python
Automation incident response workflow
the Cyber Kill Chain & MITRE ATT&CK framework
vulnerabilities, research & testing, tinkering and pulling things apart
the current vulnerabilities, response, and mitigation strategies used in cyber security;
Proficient in English (business language)
Willing to work 5/6 weeks in a year in 24/7 on-call shifts to be available for escalations outside business hours.
Certifications
GCIH, GCFA or similar
ASML Netherlands B.V.
Are you an experienced Cyber Analyst with a passion for IT Security and a curiosity how things work, we are looking for you to join our growing Cyber Defense Incident Response team as a temporary backfill for a long term absence in the team for 3-6 months..
Introduction
ASML brings together the most creative minds in science and technology to develop lithography machines that are key to producing faster, cheaper, more energy-efficient microchips. We design, develop, integrate, market and service these advanced machines, which enable our customers - the world’s leading chipmakers – to reduce the size and increase the functionality of their microchips, which in turn leads to smaller, more powerful consumer electronics.
The Cyber Defense Center (CDC) within ASML (Veldhoven office) minimizes the damage caused by threat actors bypassing ASML preventative security controls through real time detection & response and therefore protecting ASML assets. By constantly acting on alerts, improving and adapting our monitoring controls we enable ASML to operate in an increasingly hostile environment. We work closely together with other security functions and other ASML teams utilizing our shared in depth knowledge in this effort to secure the business for all our stakeholders. To improve our Incident Response services we are looking for a skilled professional in this area to complement and support our growing team.
Job Mission
You will continually watch and respond to security alerts (triage) and work with the Security Operations Center in escalations of notable incidents. You participate in continuous process improvements in order to keep up with the developing threat landscape.
Your responsibilities
Respond to medium and high priority incidents by going through the incident lifecycle
Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
Carry out the Duty Officer role & CSIRT second line standby role on a periodic basis
Create and optimize playbooks and workflows both for the SOC and for the CSIRT
Support in the design and configuration of new incident response and investigative capabilities
Help in identifying maturity gaps and lack of coverage in current capabilities and define plans for remediation
Coach and provide guidance to L1 analysts
Support in the development of threat management capability roadmaps
Level of education
Bachelor or Master’s degree in cyber security, Computer science or equivalent combination of education and work experience
Experience
2-3 years of experience working in an analyst/incident responder role within an enterprise environment able to handle more complex incidents end to end yourself.
Skills
Ability to take decisive action based on available information in a timely manner;
Ability to research and characterize security threats to include identification and classification of threat indicators;
Critical thinking and contextual analysis abilities;
Investigative and analytical problem solving skills;
Teamwork, can-do mentality;
Stress resistant and natural multi-tasker
Strong time management skills and willing to go above and beyond where required
Teaching and coaching ambition for junior team members
Knowledge on
Host forensics, network forensics, log analysis and malware (static/dynamic analysis) triage
Security ticketing systems and basic SOC procedures
Security tools e.g. log management tools, endpoint and network security controls
Networking concepts, including TCP/IP protocols and network topology
Proficient with scripting programming e.g. Bash, PowerShell, Python
Automation incident response workflow
the Cyber Kill Chain & MITRE ATT&CK framework
vulnerabilities, research & testing, tinkering and pulling things apart
the current vulnerabilities, response, and mitigation strategies used in cyber security;
Proficient in English (business language)
Willing to work 5/6 weeks in a year in 24/7 on-call shifts to be available for escalations outside business hours.
Certifications
GCIH, GCFA or similar
Myler
Voor deze opdracht dien je een bieding te plaatsen op Striive. Striive is het grootste opdrachtenplatform van de Benelux waar jaarlijks meer dan 20.000 opdrachten gepubliceerd worden.