Senior Security Operations Center Analyst (f/m/d)
Senior Security Operations Center Analyst (f/m/d)
Senior Security Operations Center Analyst (f/m/d)
Senior Security Operations Center Analyst (f/m/d)
think project! International GmbH & Co. KG
Computer-Software
München
- Art der Anstellung: Vollzeit
- 67.000 € – 86.000 € (von XING geschätzt)
- Vor Ort
- Zu den Ersten gehören
Senior Security Operations Center Analyst (f/m/d)
Über diesen Job
Senior Security Operations Center Analyst (f/m/d)
- Berlin (DE)
- Munich (DE)
- Wuppertal (DE)
- Wurzburg (DE)
- IT
- Software Development
- Fulltime
- Published: 2025-08-14
Pioneering a new era and offering a cohesive alternative to the fragmented landscape of construction software, Thinkproject seamlessly integrates the most extensive portfolio of mature solutions with an innovative platform, providing unparalleled features, integrations, user experiences, and synergies.
By combining information management expertise and in-depth knowledge of the building, infrastructure, and energy industries, Thinkproject empowers customers to efficiently deliver, operate, regenerate, and dispose of their built assets across their entire lifecycle through a Connected Data Ecosystem.
What your day will look like
We are looking for a highly experienced and technically skilled Senior Security Operations Centre (SOC) Analyst to join our team and play a key role in identifying, investigating, and responding to advanced security threats, issues and vulnerabilities across our organization. This role requires deep expertise in monitoring and securing endpoints, networks, cloud platforms, applications, and infrastructure, with the ability to manage complex incidents independently and drive continuous improvement within the SOC function.
As a senior member of the team, you will lead investigations into sophisticated threats such as advanced persistent threats (APTs), malware outbreaks, and targeted attacks. You will perform hands-on analysis of security events, including forensic evidence collection and root cause analysis, and contribute to the development of detection capabilities across SIEM, EDR, and other monitoring tools.
You will actively engage in threat hunting, leveraging your deep understanding of application code, infrastructure and hosting architectures (cloud and on-premise), the software development lifecycle (SDLC), and CI/CD pipeline solutions to identify risks that span traditional and cloud-native environments. You will also play a key role in implementing and refining automation and playbooks utilising SOAR platforms to accelerate response efforts and reduce operational overhead.
The ideal candidate will have a strong technical foundation and a proactive mindset, with a passion for staying ahead of current and emerging threats. You will collaborate closely with IT, DevOps, and application teams to improve detection coverage, enhance SOC processes, and ensure security operations are aligned with industry best practices and compliance requirements.
This role encompasses reactive incident response, proactive detection engineering, threat hunting, and vulnerability management. You will also contribute to strategic initiatives including penetration testing coordination, security assessments, and audit preparation, while mentoring analysts, sharing threat intelligence insights, and maintaining SOC documentation and workflows.
This role sits within the Product Operations and Corporate IT branch, reporting to the Director of Cyber Security and Networking, and operates as part of the broader Cyber Security, Network, and Security Engineering teams.
Main responsibilities:
- Independently investigate and respond to security alerts and events from SIEM, EDR, and other security tools across endpoints, networks, cloud platforms, and applications.
- Lead proactive threat hunting activities, leveraging threat intelligence, application logs, and infrastructure telemetry to uncover indicators of compromise or stealthy threat activity.
- Perform in-depth analysis of logs, API configurations and traffic, container environments, network data, application and infrastructure architecture, as well as data center hosting environments to support threat detection, incident investigation, and root cause analysis.
- Manage complex cybersecurity incidents end-to-end, including containment, eradication, recovery, and post-incident analysis, while coordinating closely with cross-functional stakeholders.
- Deploy, operate, configure, and tune SIEM platforms and detection tools to enhance signal accuracy, reduce alert fatigue, and maintain effective detection coverage.
- Design, build, and maintain incident response playbooks and automation workflows to increase the efficiency, speed, and consistency of incident response processes.
- Simultaneously manage multiple active investigations and day-to-day SOC operations, effectively prioritising tasks and managing time under pressure.
- Conduct forensic analysis during investigations, including evidence preservation, malware analysis, memory examination, and root cause identification.
- Collaborate with DevOps, IT, and development teams to ensure timely containment, mitigation, and remediation of vulnerabilities and threats.
- Coordinate outputs from security assessment tools and penetration tests, ensuring clear ownership and timely closure of identified issues.
- Participate in and lead security testing exercises to evaluate and strengthen detection capabilities and response procedures.
- Drive continuous improvement of SOC operations by identifying logging gaps, proposing monitoring enhancements, and introducing new detection or response technologies.
- Maintain comprehensive documentation of investigations, incidents, tuning efforts, and threat intelligence to support reporting, knowledge sharing, and audit readiness.
- Stay current with evolving threat landscapes, adversary techniques, and emerging security tools and practices to strengthen SOC capabilities.
- Adapt SOC processes, solutions, and procedures to enhance the monitoring of the organization's IT network health.
- Ensure security operations and incident response practices are aligned with industry-recognised frameworks such as ISO 27001.
- Implement solutions within CI/CD pipelines to identify and block security issues reaching production environments
- Support the development and refinement of SOC procedures, training materials, and operational standards to enhance maturity and consistency across the team.
What you need to fulfill the role
You Must Have:
Language & Communication
· Proficiency in spoken and written English, with the ability to communicate effectively across both technical and non-technical audiences
· The ability to communicate difficult or sensitive information tactfully
Education & Experience:
· A bachelor’s degree in Cyber Security or a related field, or equivalent professional experience
· Strong knowledge of cybersecurity principles, threat landscapes, and incident response procedures
· Awareness of current and emerging cyber threats affecting SaaS organisations
Technical Skills:
· Hands-on experience with implementation, ongoing management and maturing of Security Information and Event Management (SIEM) tools, Endpoint Detection and Response (EDR) platforms, threat intelligence platforms, and vulnerability identification tools
· Experience integrating custom-built applications into SIEM platforms
· Experience with implementation of automation solutions, enhancing SOC efficiency and speeding incident response
· Familiarity with Security Orchestration, Automation, and Response (SOAR) platforms, including developing and maintaining automated response playbooks
· Experience with threat hunting focused on application code, application, infrastructure and hosting architecture, leveraging coding skills and a solid understanding of the software development lifecycle (SDLC) and infrastructure components
· Experience managing security issues identified through internal tools and external assessments, ensuring remediation is completed in line with company policies and standards
· Knowledge of common security frameworks and best practices
· Experience implementing solutions to detect and block security risks in CI/CD pipelines to prevent vulnerable code from being deployed into production
SOC Operations:
· Experience in complex incident response and investigation, including forensic evidence handling and root cause analysis
· Experience managing business-as-usual (BAU) security operations workload alongside project-based work, both independently and in coordination with other team members
· Experience managing outputs from cybersecurity assessment tools, coordinating timely mitigation and remediation with key stakeholders.
· Experience coordinating outsourced penetration tests, ensuring smooth execution without service disruption
· Experience conducting security assessment exercises to evaluate SOC operational effectiveness and the organisation’s ability to respond to cybersecurity incidents
· Experience in tuning detection rules and alerts to improve accuracy and reduce false positives in security monitoring
Technical Expertise:
· Experience with Azure, Azure AD, and AWS technologies and services
· Experience conducting forensic analysis of cybersecurity incidents
Teamwork & Leadership:
· A positive, self-motivated attitude
· The ability to work effectively in a team environment, collaborating with cross-functional teams to achieve shared objectives
· Strong time management and prioritisation skills, with the ability to manage your own workload
· The ability to perform effectively under pressure, prioritise tasks, and make sound decisions in high-stress or emergency situations
· A proactive mindset with the ability to critically evaluate your own work, identify improvement opportunities, and automate, simplify, or standardise processes where appropriate
It Would Be Good to Have:
Language Skills:
· Proficiency in German (spoken and written)
SOC Operations
· Experience conducting red or purple team exercises to validate detection capabilities and improve response playbooks
· Familiarity with security operations in containerised environments and microservices architectures (e.g., Kubernetes, Docker)
Technical Skills:
· Understanding of advanced detection engineering techniques, such as creating custom correlation rules and behavioural analytics in SIEM platforms
· Exposure to secure software development practices and security testing of APIs, containers, and cloud-native applications
· Experience conducting both external and internal penetration testing of applications and infrastructure.
Technical Expertise:
· Experience with Microsoft Sentinel SIEM Solutions
· Experience working within a SaaS or software-driven organisation, particularly in multi-tenant or cloud-native environments
Experience with AI technologies, including understanding the cybersecurity threats they pose to organizations and how they can be leveraged to enhance operational effectiveness.
What we offer
We are a passionate bunch here. To join Thinkproject is to shape what our company becomes. We take feedback from our staff very seriously and give them the tools they need to help us create our fantastic culture of mutual respect. We believe that investing in our staff is crucial to the success of our business.
Your contact:
Aurélia Faisandel
Please submit your application, including salary expectations and potential date of entry, by submitting the form on the next page.
Working at thinkproject.com - think career. think ahead.
Gehalts-Prognose
Unternehmens-Details
think project! International GmbH & Co. KG
Computer-Software
201-500 Mitarbeitende