#1 Job Board for tech industry in Europe

  • Job offers
  • SOC Senior Analyst
    New

    SOC Senior Analyst

    Warszawa
    Type of work
    Full-time
    Experience
    Mid
    Employment Type
    Permanent
    Operating mode
    Hybrid

    Tech stack

      mitre attack

      advanced

      EDR

      advanced

      SIEM

      advanced

      IDS/IPS

      advanced

    Job description

    Online interview

    BeiGene continues to grow at a rapid pace with challenging and exciting opportunities for experienced professionals. When considering candidates, we look for scientific and business professionals who are highly motivated, collaborative, and most importantly, share our passionate interest in fighting cancer.


    General Description: 

     

    As a SOC Senior Analyst, you will play a critical role in BeiGene’s Information Security Operations, contributing to the detection, analysis, and response to cybersecurity threats. Reporting to the Senior Manager Information Security Operations, you will work closely with IT teams, security leadership, and third-party partners to monitor, investigate, and mitigate potential security incidents. Your expertise will drive continuous improvement in SOC processes, tools, and incident response capabilities while aligning with industry best practices.

     


    Essential Functions of the job: 

    •  Monitor and analyze security events using SIEM, EDR, and network monitoring tools to detect and respond to threats.

    •  Lead in-depth investigations of complex security incidents, determining root cause, impact, and mitigation steps.

    •  Serve as the primary escalation point for critical incidents requiring advanced analysis and coordination.

    •  Develop, maintain, and optimize SOP and playbooks to align with evolving threats and processes.

    •  Proactively conduct threat hunting to identify and mitigate undetected malicious activity.

    •  Collaborate with IT, business units, and vendors to remediate incidents and implement improvements.

    •  Develop and report on SOC metrics and KPIs to measure performance and incident response effectiveness.

    •  Deliver detailed incident reports and executive summaries to leadership and stakeholders.

    •  Participate in tabletop exercises and test incident response plans to identify gaps and improve readiness.

    •  Stay current on emerging threats, vulnerabilities, and mitigation strategies through threat intelligence research.

    •  Mentor and coach junior SOC analysts, fostering professional growth and continuous learning.


    Supervisory Responsibilities:  


    •  Oversee the work of junior SOC analysts by providing guidance, performance feedback, and technical support to ensure accurate analysis, effective incident response, and professional development.

    •  Lead and coordinate response activities across the SOC team, ensuring efficient escalation, proper task delegation, and timely resolution of critical security incidents.


    Computer Skills:  Proficient in security technologies such as SIEM, EDR, IDS/IPS, vulnerability management, and log analysis tools.

     

    Requirements:

    •  3+ years of hands-on experience in a SOC or equivalent security role, with exposure to incident response and threat analysis.

    •  Strong understanding of the Cyber Kill Chain, MITRE ATT&CK Framework, and modern threat actor techniques.

    •  Experience with security event monitoring and triage, including the analysis of logs and network traffic.

    •  Solid knowledge of endpoint security, network security fundamentals, and operating systems.

    •  Ability to conduct forensic analysis and identify indicators of compromise (IOCs).

    •  Strong verbal and written communication skills for both technical and non-technical audiences.

    •  Knowledge of compliance frameworks (e.g., NIST, ISO 27001) and their operational implications.

    •  Relevant certifications (e.g., GCIH, GCFA, or CompTIA CySA+).

     


    Other Qualifications:

    •  Strong problem-solving and analytical skills, with a proactive approach to threat detection and mitigation.

    •  Ability to work in a fast-paced, dynamic environment, balancing multiple priorities.

    •  Commitment to continuous learning and staying updated on cybersecurity trends and technologies.

    •  Familiarity with scripting languages such as Python, PowerShell, or Bash to analyze security data, parse logs, and identify potential threats or anomalies during investigations.


    Travel: Occasional travel may be required for training, conferences, or incident response support.

    Undisclosed Salary

    Permanent

    Check similar offers

    Cyber security consultant

    New
    BEC Financial Technologies
    Undisclosed Salary
    Warszawa
    Cybersecurity
    ISO
    ITIL

    Information Security Officer

    New
    emagine Polska
    0.104K - 0.146K PLN/h
    Warszawa
    , Fully remote
    Fully remote
    Compliance Frameworks
    IT Security
    risk and threat assessments

    Information Security Officer (ISO)

    New
    ERGO Technology & Services
    Undisclosed Salary
    Gdańsk
    Security standards
    ISO 31000
    English

    Solution Engineer, EmpowerID IAM

    New
    BRAVER IT SPÓŁKA AKCYJNA
    15K - 22K PLN/month
    Warszawa
    , Fully remote
    Fully remote
    Postman
    IAM
    Azure

    Cloud Security Engineer

    New
    Pandadoc
    Undisclosed Salary
    Warszawa
    , Fully remote
    Fully remote
    Security
    Microsoft Azure
    AWS

    Practice your English before your job interview!

    Get 3 free English lessons