Subject Matter Expert Security

Context

The Cyber Defence team safeguards the organization from unauthorized cyber activity by delivering both proactive and reactive services. These include preparing systems against potential attacks through threat intelligence, securing environments in advance, and responding swiftly to security events detected either automatically or by human reporting. To strengthen these capabilities, our client is seeking an Incident Response Analyst to support incident handling, digital forensics, threat hunting, and threat analysis activities.

Responsibilities

  • Drive the handling of security incidents by defining and assigning response actions and following up on their execution.

  • Coordinate ad hoc response teams during severe incidents to contain, mitigate, eradicate, and restore.

  • Perform Digital Forensics across various assets, particularly Windows systems.

  • Develop reaction plans and runbooks for security incident handling and monitoring alerts.

  • Conduct threat hunting activities based on new intelligence or incident-driven needs.

  • Collect cyber threat intelligence using the internal CTI platform.

  • Execute full threat analysis: identify impacted assets, build threat scenarios, develop kill chains, and prioritize threats.

Technical skills

Must have

  • Strong knowledge of IT security technologies and processes (secure networking, web infrastructure, system security, perimeter protection, etc.).

  • Experience with security incident management in SOC, CSIRT, or IT environments.

  • Experience with logging, monitoring, or intrusion detection.

  • Passion for Cyber Security.

  • Strong analytical skills and ability to work under pressure in emergency situations.

  • Excellent communication skills.

  • Autonomy, commitment, perseverance, and a solid sense of integrity.

  • Fluent spoken and written English; good spoken and written French.

Should have

  • Good understanding of Dutch (optional but valued).

  • Ability to see both the fine detail and the bigger picture.

  • Demonstrated ability to learn on the job and share knowledge.

Nice to have

  • Knowledge of IDS/IPS, NetFlow, and protocol analysis tools (Snort, Suricata, Bro, Argus, SiLK, tcpdump, WireShark).

  • Experience with SIEM and log aggregation tools (QRadar, Splunk, ELK, etc.).

  • Experience with scripting or programming (Perl, Ruby, Python).

  • Familiarity with text manipulation tools (sed, awk, grep).

Who we are

Community Consulting goes beyond traditional consulting; it’s all about fostering connections in an atmosphere of trust and confidence.

Transparency & Honesty : We say things as they are. Clear communication for seamless collaboration.

#COMMUNITEAM : Work independently, but never alone. Collective intelligence drives us further, faster.

Total Commitment : Always present, always engaged. We find solutions and make sure everyone moves forward together.

Guaranteed Efficiency : No fluff, just results. We act fast, keep our promises, and deliver top quality.

This is our DNA. This is how we make a difference.

Type

Permanent or Freelance

Contract

Full-time

Location

Brussels

Homeworking

3 days per week

Sector

Banking sector

Keywords

You Career Advisor

Elisa Speleers
Talent Acquisition Officer
e.speleers@communityconsulting.be

Are you interested in this job offer ?