Aller au contenu principal

3D-ICT - CSIRT Officer SAP H/F/X

Référence 5636506 | Créé le 04 novembre 2025

Retour à la liste
  • Temps de travail : Temps plein
  • Type de contrat : Durée indéterminée
  • Famille de métiers : Informatique / Services informatiques

Description de l'entreprise

3D-ICT is an all-round ICT-solutions company that mainly focuses on Consultancy, Managed Services/Managed Staffing and Cloud Computing.

Description de la fonction

Functie-eisen


As a CSIRT Officer, you will join the CISO Cybersecurity Center of Excellence team within the CISO organization. You will contribute to daily security incident preparation, detection, and response activities, including threat detection, incident handling, and threat hunting. You will also propose and execute improvement actions, and interact with internal staff and security service providers.

Key responsibilities

  • Incident handling and response: As a member of a dynamic CSIRT team, you will need to be able to respond adequately to cybersecurity incidents by working together with fellow CSIRT officers and any possible stakeholders. This includes:
    • Investigate and respond to level 3/4 security incidents, including malware infections, network intrusions, and data breaches
    • Conduct forensic investigations, coordination, and analysis of security incidents, regardless of IT, IoT, or OT origin
    • Work closely with other members of the SOC, CSIRT, and other teams within the organization to identify and mitigate security risks
    • Develop and implement incident response plans and procedures, and provide guidance to other members of the organization on security best practices
    • Communicate and report security incident progress to required internal and external stakeholders
  • Threat detection and hunting: As a CSIRT officer, you will also be responsible for threat detection and hunting. You will use your expertise in security operations to proactively identify threats and vulnerabilities within the organization's infrastructure with the help of the SIEM and custom detection tools. This will involve conducting regular threat hunting exercises to detect potential threats that may have evaded detection by traditional security measures. You will use a variety of tools and techniques to collect and analyze security data to identify anomalous behavior and potential indicators of compromise. Additionally, you will work closely with the 3rd party SOC team to investigate potential security incidents and provide guidance on threat remediation and mitigation strategies. You are able to read and understand logs (Windows, Linux, network, etc.) to analyze system artifacts for signs of compromise.
  • SIEM Engineering: You will play a critical role in ensuring the organization's security posture remains strong. You will develop, maintain, and optimize our SIEM systems to ensure timely detection and response to security incidents. This will involve creating and maintaining use cases and detection rules (based on the MITRE ATT&CK framework), as well as writing playbooks for the SOC team to ensure consistent and effective incident response. Additionally, you will automate the response to SIEM and EDR events as much as possible, allowing the SOC and the CSIRT to focus on the essentials.
  • Projects: Next to the core business of our team activities mentioned above, you will also contribute to different projects based on the needs of our team. This can include rolling out new products or platforms, maintaining them, and automating manual tasks with the help of scripts, etc.

Evaluation criteria

  • Strong analytical and problem-solving skills, with the ability to identify and respond to security incidents in a timely and effective manner
  • Strong knowledge of security technologies and tools, such as Sentinel SIEM, EDR, Defender, intrusion detection and prevention systems, Firewalls, etc.
  • Strong knowledge of Critical Infrastructure technologies and SAP tools
  • Strong understanding of networking protocols and technologies, as well as operating systems
  • Experience with security incident response tools and techniques, including forensics and/or malware...
...

Compétences linguistiques

  • Anglais (atout)

    • Comprendre : Expérimenté - (C1)
    • Écrire : Expérimenté - (C1)
    • Lire : Expérimenté - (C1)
    • Parler : Expérimenté - (C1)

Envie d'en apprendre davantage sur ce métier ou sur un métier proche de celui-ci ? Parcourez toutes les informations utiles sur Panorama des métiers. Panorama des métiers

Cette offre a été rédigée par l'employeur, Actiris n'est donc pas responsable de son contenu et des éventuelles infractions à la législation en vigueur.
Attention, un employeur ne peut pas vous demander de lui communiquer des données sensibles. En savoir plus.
Si vous avez une remarque sur cette offre, n'hésitez pas à nous la communiquer via ce formulaire de contact.

Comment postuler ?

Nom de l'employeur
3D-ICT
Personne de contact
HR Department 3D-ICT
Mode de présentation
postuler via le site Web
Website
Site de l’employeur