CSIRT (Digital Forensics, Incident Handler) at LMGC
Luxembourg, Canton Luxembourg, Luxembourg -
Full Time


Start Date

Immediate

Expiry Date

05 May, 25

Salary

0.0

Posted On

06 Feb, 25

Experience

0 year(s) or above

Remote Job

No

Telecommute

No

Sponsor Visa

No

Skills

Incident Handling, Training, Wireshark, Languages, Knowledge Sharing, Workshops, Threat Intelligence, Volatility, Snort, Reporting, Incident Response, Python

Industry

Information Technology/IT

Description

LMGC is an IT services company which specialized in SAP when it was founded in 2006.
For over 10 years, LMGC has been providing IT expertise to its Luxembourgish and European customers.
Well-known and recognized for its SAP know-how in Europe, LMGC is also a major player in the Greater Region, supporting its customers in the modernization and digitization of their technological structures.
One of the most important services is the the provision of IT profiles for short, medium and long-term consultancy.
To meet our partners’ needs, we make at their disposal not only our IT expertise, but also consultants in all IT fields, such as development, business intelligence, project management, business analysis, networking, systems, security, etc.
We are seeking a motivated CSIRT Specialist with expertise in Digital Forensics and Incident Handling to join our team of cybersecurity professionals. In this role, you will assist organizations in responding to and mitigating security incidents through host forensics, log
Suivant analysis, and incident response preparation. Additionally, you will contribute to the development of detection use cases, improve our in-house CSIRT tools, and participate in workshops or training sessions to share knowledge and expertise.
Whether you are an experienced professional or at the early stages of your cybersecurity career, this position offers an excellent opportunity to grow within the field of incident response and cyber defense.
Key Responsibilities

KNOWLEDGE SHARING AND TRAINING:

Conduct training sessions or workshops with customers or peers to share knowledge about incident handling.
Present research or work at security conventions to contribute to the broader cybersecurity community.
Requirements
Extensive experience in Incident Response.
Deep understanding of networks (HTTP2/Quic, Dot/Doh, etc.) and operating system internals.
Proficient in tools like Volatility, Log2timeline, WireShark, Tshark, Snort, MISP, IntelMQ.
Skilled in debugging Python 3 code (and occasionally Python 2).
Experience with threat intelligence—understanding its capabilities and limitations.
Ability to work under pressure and maintain composure with stressed stakeholders.
Mentorship skills to support and share knowledge with less experienced team members.
Strong writing and reporting capabilities.
Languages: French and English mandator

Responsibilities

Please refer the Job description for details

Loading...