Senior Information Security Analyst at Brenntag
Amsterdam, Noord-Holland, Netherlands -
Full Time


Start Date

Immediate

Expiry Date

06 Aug, 25

Salary

0.0

Posted On

06 May, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Analytical Skills, Aws, Azure, Computer Security, Cloud Security, Communication Skills, Edr, Computer Science, Information Security, Investigation, Siem

Industry

Information Technology/IT

Description

We are seeking a highly skilled and experienced Senior Security Analyst to join our security operations team. This is a hands-on, strategic role that blends technical expertise with a proactive security mindset.

Key Responsibilities:

  • Assist with the design, implement and operation of our SIEM/SOC/SOAR tools.
  • Lead investigations of complex security incidents and coordinate incident response activities.
  • Collaborate cross-functionally with IT, Threat Prevention, Identity and Access Management (IAM), GRC, and other teams to improve our overall security posture.
  • Identify, contain, remediate, and recover from all cybersecurity incidents.
  • Conducting in-depth security analyses and proactive threat intelligence analyses.
  • Monitoring and tuning security tools for optimal improvement.
  • Develop and maintain playbooks, incident response procedures, and documentation.
  • Participate in audits and support regulatory/compliance initiatives.
  • Prevent data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs.
  • Reviews violations of security procedures; provides training to ensure violations do not recur.
  • Monitors and restricts access to sensitive, confidential, or other high-security data.
  • Performs other related duties as assigned.

Qualifications:

  • Bachelor’s or master’s degree in computer science or equivalent experience in Information Security preferred.
  • 5 -10 years of experience in computer systems. Specialization in computer security is highly preferred.
  • Demonstrate problem-solving and analytical skills.
  • Hands-on experience with SIEM (e.g., Splunk, QRadar, Sentinel), EDR, and SOAR platforms.
  • Proficient or able to gain proficiency in several security software applications and tools.
  • Experience with cloud security (AWS, Azure, or GCP).
  • Cloud Security orchestration, advanced, persistent, and targeted threat detection, and investigation.
  • Excellent verbal and written communication skills in English and popular regional language.

Certifications (Preferred but not required):

  • CISSP, GIAC (GCIH, GCIA, GCFA), OSCP, or equivalent.
Responsibilities
  • Assist with the design, implement and operation of our SIEM/SOC/SOAR tools.
  • Lead investigations of complex security incidents and coordinate incident response activities.
  • Collaborate cross-functionally with IT, Threat Prevention, Identity and Access Management (IAM), GRC, and other teams to improve our overall security posture.
  • Identify, contain, remediate, and recover from all cybersecurity incidents.
  • Conducting in-depth security analyses and proactive threat intelligence analyses.
  • Monitoring and tuning security tools for optimal improvement.
  • Develop and maintain playbooks, incident response procedures, and documentation.
  • Participate in audits and support regulatory/compliance initiatives.
  • Prevent data from accidental or unauthorized modification, destruction, or disclosure; adheres to emergency data processing needs.
  • Reviews violations of security procedures; provides training to ensure violations do not recur.
  • Monitors and restricts access to sensitive, confidential, or other high-security data.
  • Performs other related duties as assigned
Loading...