Senior Cyber Security Analyst

About PRYM

Do you want to break new ground and actively shape the growth path of one of the oldest family-owned businesses in the world? Then it’s time to join Prym. Founded in 1530 we are known for highest quality for centuries. The groups portfolio ranges from the iconic snap fastener to fashionable fastening systems, a comprehensive range for creative handicrafts and high-precision components for the automotive, ICT, and electrical industries. The Prym Group employs around 3,500 people worldwide, operating in the four independent divisions Prym Consumer, Prym Fashion, Prym Intimates and Inovan. Today, we are looking for talents, that want to leave their own mark on our sustainable legacy.

Cyber Security Operations Centre:
Prym Shared Services is seeking a dynamic and results-oriented candidate who specializes in cybersecurity to join its growing team. The successful candidate will be responsible for cybersecurity processes and will be tasked with building a cybersecurity unit. The high performing candidate should work to the ISO27000 standard(s) for information security management and demonstrate a preference for emphasizing governance and management over solely technical controls. This role requires a continuous improvement mindset, strong risk management skills and the ability to navigate an international environment.

Key Responsibilities
• Monitor security alerts and respond to incidents, including analyzing and mitigating threats to protect the organization’s systems and data. 
• Analysis and response of detected security incidents, timely escalation and drive to ensure the closure of incidents.
• Knowledge of auditing standards and frameworks (e.g., MITRE Att&ck & Detection Lifecycle Management).
• Incident Response skills including proficiency in PCAP Capture, Network Analysis, and Traffic Patterns.
• Identify attacks and malware (Trojans, Ransomware, etc.) analyzing event data generated from proxy, endpoints, IDS, network devices etc.
• Experience in deploying rules and writing customized signature-based for Microsoft Defender.
• Understanding of open-source network analysis tools and intelligence tools (OSINT).
• In-depth knowledge of the Cyber Kill-Chain, intelligence-driven defense and security architectures.
• Provide basic forensics support to acquire and analyze system and network artifacts during security incidents.
• Assist in the development and implementation of security policies, procedures, and best practices to enhance the organization’s security posture.
• Work closely with IT teams and other departments to integrate security measures into the organization’s processes and systems.
• Educate employees about cybersecurity best practices and safe online behavior to reduce the risk of security breaches.

Qualifications
• Education: A bachelor’s degree in computer science, Information Technology, Cyber Security, or a related field is typically required.
• Certifications: Relevant certifications such as CISSP, CEH, CISM, or GIAC is highly preferred.
• Experience: Previous experience in cybersecurity operations, incident response, or a related field is highly desirable.

Desired Skills
• Technical Proficiency: Strong understanding of security technologies, network protocols, and operating systems.
• Analytical Skills: Analyzing security incidents and data to identify trends and potential threats.
• Communication Skills: Excellent verbal and written communication skills to effectively convey security issues to technical and non-technical stakeholders.
• Problem-Solving: Strong problem-solving skills to quickly address and mitigate security incidents.


Purpose of the role
To monitor the performance of operational controls, implement and manage security controls and consider lessons learnt to protect PRYM from potential cyber-attacks and respond to threats.
• Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimized system damage.
• Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise.
• Management and analysis of security information and event management systems to collect, correlate and analyze security logs, events and alerts/potential threats.
• Triage of data loss prevention alerts to identify and prevent sensitive data from being exfiltrated from the network.
• Management of cyber security incidents including remediation & driving to closure.