The mission has started. We proudly announce that in our Battery Valley we are starting our own battery cell production and the ramp up of our worldwide headquarters for global cell manufacturing. In this, the tasks and requirements of the unit Information Technology are varied. IT takes care all matters relating to information technology, i.e. electronic data processing. The responsibilities vary from IT-infrastructure to digitization of the organization to the operational use of electronic data processing throughout the organization.
How you will CELLebrate
Monitoring and analyzing security events using SIEM tools
Conducting threat hunting and incident response activities
Investigation and resolution of security incidents, producing post-incident reports
Performing vulnerability assessments and provide remediation guidance
Developing and maintaining security dashboards for reporting
Ensuring compliance with security frameworks and company policies
Proactively identify, analyze, and mitigate emerging security threats
Development of custom detection rules for SIEM systems
Maintaining incident response playbooks and procedures
Performing malware analysis and reverse engineering when necessary
Managing endpoint security tools (EDR solutions)
Collaboration with other IT teams to investigate suspicious network or endpoint activities
Participation in red team/blue team exercises to improve defense capabilities
Maintaining up-to-date threat intelligence feeds and apply relevant findings
Performing regular penetration testing and vulnerability scanning
What you need for our CELLebration
Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience)
2-5 years of experience in cybersecurity or related roles
Proficiency with security monitoring tools (e.g., Splunk0)
Familiarity with threat intelligence tools and techniques
Knowledge of security frameworks like NIST, CIS, or ISO 27001
Certifications (preferred): CompTIA Security+, GIAC Security Essentials, or CEH
What else can you bring
Experience in malware analysis and reverse engineering
Knowledge of machine learning applications in threat detection
Familiarity with SOAR (Security Orchestration, Automation, and Response) platforms
Experience with custom rule creation in SIEMs like Splunk
Participation in Capture-the-Flag (CTF) competitions or security research projects
Open-source contributions to security tools or communities