RBI is fostering its Business for the next generation in Information & Cyber Security.
As crucial part of the Group Raiffeisen Bank International Cyber Defense Center department this function develops detection and prevention mechanism to foster our digitalization journey and the business confidence of our customers.
In this position you will be member of a group CDC team. This includes providing effective security monitoring through triage, investigation, communication and reporting. You will be encouraged to conduct your own hunting investigations and create use cases and building tactical and strategic mitigation plans to increase the security posture. Within the CDC, you will be also part of RBIs DDOS protection and response capability.
What you can expect:
Conduct in-depth L3 analysis of security incidents and events, DDOS attacks, EDR alerts etc.
Lead response action for security incidents, and DDOS attacks, to ensure proper and timely response actions
Proactive threat hunting / threat analysis on threat actors within our environments and infrastructure
Develop and manage DDOS protection strategies using industry-leading solutions and actively contribute to the operations of RBIs DDOS protection suite
Leverage a deep understanding of network architecture and protocols such as TCP/IP, BGP, DNS to design and implement secure and resilient network defenses
Enhance RBIs threat intelligence capabilities by leveraging technology and information available from both internal and external sources
Participate in the creation and refinement of SOC processes and playbooks
Generate detailed reports and documentation for incidents and investigations
Mentor and provide guidance to L2 analysts (incl. quality assurance)
What you bring to table:
Expert knowledge in network security architecture concepts, application security, emerging IT and cybersecurity technologies
Hands on experience with monitoring and detecting incidents in a Security Operations Center
Experience in DDOS protection and its operations
Strong knowledge of DDOS attack vectors, mitigation techniques, and experience with tools such as Arbor Networks, Akamai, Cloudflare.
In-depth understanding of network protocols (TCP/IP, DNS, BGP) and hands-on experience in network security infrastructure (firewalls, IDS/IPS, routers, switches, load balancers)
Experience in cyber threat intelligence, OSINT and its related platforms
Strong understanding of MITRE ATT&CK framework, cyber kill chains and current attack vectors
Knowledge in information & cyber security management with regards to processes, concepts, methodologies
Excellent command of written and spoken English
Strong coordination and excellent communication and presentation skills within an international environment
Ability for independent decision-taking and issue resolution
Practical experience in IT security in large enterprises
Experience as security operations center analyst and practical experience with a SIEM system
Knowledge in the use of machine learning for anomaly detection
Red Teaming experience
Command of written and spoken German
What we offer:
Work Life Balance: working hours (no core time), extensive hybrid working options / work from home
Easy Moving: relocation allowance & work permit support
Top-notch Equipment: modern tools & technologies
International Spirit: multi-cultural teams, English as company language, team building events
Learning & Agile Working: as part of our DNA & culture
Canteen: healthy, tasty, and heavily subsidized
Saving: with vouchers / discounts from our staffs' council (e.g., supermarket)
Further Goodies: free public transport pass, salary account & credit card, reduced gym membership, gender-neutral parental leave, bilingual company kindergarten etc.
Salary: the offered gross yearly salary starts at 47.000 Euro (basis full-time) including overtime, depending on qualification and experience
For questions regarding our application process, please feel free to take a look on our website or check out our FAQ.