About Swiss Re Swiss Re is one of the world's leading providers of reinsurance, insurance and other forms of insurance-based risk transfer, working to make the world more resilient.
We anticipate and manage a wide variety of risks, from natural catastrophes and climate change to cybercrime.
Combining experience with creative thinking and cutting-edge expertise, we create new opportunities and solutions for our clients.
This is possible thanks to the collaboration of more than 14,000 employees across the world.
Our success depends on our ability to build an inclusive culture encouraging fresh perspectives and innovative thinking.
We embrace a workplace where everyone has equal opportunities to thrive and develop professionally regardless of their age, gender, race, ethnicity, gender identity and/or expression, sexual orientation, physical or mental ability, skillset, thought or other characteristics.
In our inclusive and flexible environment everyone can bring their authentic selves to work.
Join a team of cybersecurity professionals and help Swiss Re to fulfil its mission in making the world more resilient.
As a Cybersecurity Analyst, you'll be monitoring current threats by analysing and managing major cyber incidents.
You'll be working in a hybrid setup, perfectly balancing work from home and the office premises.
About the Role and Team The Security Team is the focal point for all security activities across Swiss Re.
We are responsible for keeping the company safe - by going the extra mile in terms of preciseness and diligence.
As part of the Security Team, Monitoring and Response is a team of experts responsible for maintaining security operations, focused on delivering high-quality detection monitoring and response solutions.
We're looking for a cybersecurity professional who'll use their creative thinking to produce detection content, manage incidents and help us to improve our incident response techniques.
In your role, you will: Craft detection content Prioritize triage events Improve existing detection content and playbooks Ensure in-time incident response Manage major security incidents Analyse and document incidents About You What we need from you: In-depth knowledge of current threat landscape, offensive tooling, and OWASP and MITRE ATT&CK techniques Technical writing skills to present complex topics to non-technical audiences Excellent oral and written communication skills (English) Malware and exploit analysis (or reverse engineering) Your additional experience should include: Developing hypothesis-driven threat hunts Analysing various events, including but not limited to web traffic, underlying network protocols, malware, lateral movement TTPs (techniques, tactics, and procedures), or Microsoft and Linux security events Logfile correlation and analysis System and memory analysis Chain of custody and forensic acquisitions Major incident response or breach investigation management Nice-to-have: Experience developing in Python, Kusto, or any other scripting language Experience with Azure or Amazon AWS We are an equal opportunity employer, and we value diversity at our company.
Our aim is to live visible and invisible diversity - diversity of age, race, ethnicity, nationality, gender, gender identity, sexual orientation, religious beliefs, physical abilities, personalities and experiences - at all levels and in all functions and regions.
We also collaborate in a flexible working environment, providing you with a compelling degree of autonomy to decide how, when and where to carry out your tasks.
#J-18808-Ljbffr