Vacancy Security Engineer (MDR)

Making the world a safer place, at NFIR we work on that every day. Do you want that too?

NFIR is a young and fast-growing Dutch cybersecurity company where the passion for IT security is huge. In NFIR’s open corporate culture, freedom and responsibility go hand in hand. We are committed to providing our clients with the best quality. We also want to be a good and attractive employer, where you will enjoy working and where you can develop further.

To further shape our growth, we are looking for a Security Engineer Managed Detection & Response (MDR). Do you have at least 2 years of experience in the field of MDR and would you like to help expand MDR services? Then we are looking for you!

The function

As a Security Engineer within our MDR department, you are the all-round specialist in the field of cybersecurity. You will work in a multidisciplinary team of service managers, business consultants and security engineers/analysts. As a Security Engineer within the MDR department, you will be responsible for managing, monitoring and responding to security incidents to protect our customers’ digital environment. You will play a critical role in detecting threats, investigating incidents and implementing security measures to neutralize potential threats.

What will you do?

The duties as a Security Engineer within MDR are diverse below is a summary:

  • Proactive Monitoring: continuously monitor security events and client logs to identify suspicious activity. collaborate in following up on notifications to support SOC analysts.
  • Incident detection: leverage threat intelligence, security analytics and advanced detection tools to identify and classify security incidents.
  • Incident Response: Respond quickly to security incidents by taking appropriate action to minimize the impact. Coordinate incident response activities and collaborate with customers to effectively address the incident.
  • Research and Analysis: Perform in-depth analysis to understand the origin and impact of incidents. Identification of attack methods and techniques used for future prevention.
  • Vulnerability Assessment: Evaluate systems and networks for vulnerabilities and advise customers on possible improvements.
  • Security Advice: Providing security advice and recommendations to customers for improving their security measures and practices.
  • Collaboration and Communication: Effective communication with customers, internal teams and third parties to coordinate incidents and actions.
  • Reporting: Prepare detailed reports and documentation of incidents, investigations and security measures.
  • Research and Development: Stay abreast of the latest threats, security practices and technologies through ongoing professional development and research. Participate in program code development. build (your) use cases in the Elastic Platform. And also stay well informed about current cybercrime threats, allowing you to use this knowledge in the development of new systems, software and use cases.

What do you bring?

  • Minimum of 2 years experience in a similar role within cybersecurity.
  • Thorough knowledge of network security, intrusion detection/prevention systems and SIEM solutions.
  • Certifications such as CISSP, CISM, CSA or CEH are a plus.
  • Excellent communication skills and ability to explain complex technical concepts clearly.
  • You have a good ability to work independently and as part of a team;
  • You have some programming experience in JavaScript, PHP or Python, for example;
  • You are no stranger to the concepts of IDS/IPS, SIEM, Docker/Kubernetes and Ansible;
  • You have good communication skills;
  • You are available for a minimum of 32 hours per week;
  • HBO/WO work and/or thinking level required;
  • Experience with Elasticsearch, Kibana, Logstash (ELK) is a plus;
  • Because of the work, a corps heritage approval is required;
  • Experience with agile working is a plus.

What we offer you

  • Fun corporate and team outings. Knowledge and fun sessions, game nights, etc.
  • A nice work environment where there is hard work but also room for relaxation
  • A challenging position with plenty of room for growth, autonomy and independence
  • Good primary and secondary benefits, think mobility scheme, profit sharing, pension
  • Training opportunities
  • A good overtime arrangement
  • Hybrid working from The Hague and/or Zwolle.

Work in a vibrant and professional team

Do you recognize yourself in the above description and are you interested in joining us? Mail your application to vacancies via vacatures@nfir.nl. Of course, if you have any questions, you can also contact us first by calling 088-323 0205.

Vacancy in PDF: Vacancy MDR in PDF

Acquisition based on this job posting is not appreciated.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Geïnteresseerd of vragen? Laat je gegevens achter en we bellen jou. Je kunt ook direct solliciteren op "Vacancy Security Engineer (MDR)".

Accepted file types: pdf, Max. file size: 20 MB.
Accepted file types: pdf, Max. file size: 20 MB.

SECURITY INCIDENT AT YOUR ORGANIZATION?

The next 30 minutes are crucial!

The first 30 minutes after a cyber security incident are crucial because a quick and adequate response can limit the damage. In addition, further spread of the attack can be prevented and essential evidence can be secured for further investigation.

Our Computer Emergency Response Team (CERT) is available 24/7 to support businesses and organizations during IT security incidents.

SECURITY INCIDENT AT YOUR ORGANIZATION?

The next 30 minutes are crucial!

The first 30 minutes after a cyber security incident are crucial because a quick and adequate response can limit the damage. In addition, further spread of the attack can be prevented and essential evidence can be secured for further investigation.

Our Computer Emergency Response Team (CERT) is available 24/7 to support businesses and organizations during IT security incidents.

SECURITY INCIDENT AT YOUR ORGANIZATION?

The next 30 minutes are crucial!

The first 30 minutes after a cyber security incident are crucial because a quick and adequate response can limit the damage. In addition, further spread of the attack can be prevented and essential evidence can be secured for further investigation.

Our Computer Emergency Response Team (CERT) is available 24/7 to support businesses and organizations during IT security incidents.