SOC Analyst

Set up as a new job alert
  1. Contract
  2. English
  3. Associate
  4. Digital & Technology
  5. Basel
  6. Financial Services


SOC Analyst, Networking, SIEM, Incident Response

Click here to get a notification every time a job like this gets added

Great news! We will let you know when a new job like this has been added!

This vacancy has now expired
As one of the premier suppliers to our international banking client in Basel, Swisslinx are looking for an experienced SOC Analyst to work in a small and highly experienced Security Operations Team on a contract basis starting ASAP.

This is a rolling 12 month contract running with option to extend up to five years.

The SOC Analyst performs tier 1 & 2 accident report activities (the team work end to end according to a Tier List Model), and will take on a more operational type of job where the main responsibilities will be in the incident management area.

You would join a small team of experienced cyber security enthusiasts at the forefront of their field and hailing from all corners of the globe and be encouraged to take on additional tasks such as threat hunting, digital forensics and vulnerability management.

Your responsibilities will include the following:

• Information security operations, incident response, and intrusion/event analysis
• Provide mainly Tier 1 and Tier 2 SOC support
• Dedicated monitoring and analysis of cyber security events (Triage)
• Incident Response generation and reporting.
• Processing of incident communications to include initial reporting, follow-ups, requests for information and resolution activity
• Support and enhance event parsing, log collection, storage, automation and monitoring
• Providing recommendations for containment and eradication of threats in order to reduce the risk
• Maintaining awareness of trends in security regulatory, technology, and operational requirements.
• Provide on call support as required

In order to be considered for this role, you will possess the following skills and experience:
• 4+ years of experience in security operations (including experience in Tier 2 operations) and/or security engineering
• Proven experience in case / alerts investigation
• Experience with digital forensics and incident response
• Experience with performing thread hunting activities
• 3+ years of experience or Knowledge of network protocols (http, dns, LDAP, FTP, etc)
• 3+ years of experience or Knowledge of networking (Firewalls, NGFW, IPS/IDS, packet captures)
• Very good level of English language
• 3+ years of experience or knowledge of Log analysis and Digital Forensics – leveraging SIEM (preferably IBM QRadar and Azure Sentinel) technology
• Fluency in English
The following is nice to have:

• Familiarity with Cloud security services (Preferably Microsoft Azure)
• Basic programming knowledge is desirable (PowerShell and python) to assist with automation of SOC tasks
• Experience of handling Incidents to resolution and participating in threat hunting activities
Please note interviews would be conducted via video call, however the role is based 100% in Switzerland. Our client offers:

• The opportunity to work in a diverse and international environment on a long-term basis
• 50% working from home
• 20 days working remotely from abroad per year
• Modern office in central Basel (50 minutes direct train from Zurich) with subsidised canteen

Are you interested to work in an international environment in one of the most important financial companies worldwide? Then apply now! We look forward to receiving your full application before the deadline on Wednesday 6 March.

How to Build Networking Skills in 2024


How do I start a career in commodities?