Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
We are seeking 8 talented individuals to join our Global Cyber Defense team at Marsh McLennan.
This role will be based in our Security Operations Center (SOC) as part of Cluj Tech Hub.
Marsh McLennan (MMC) has established its EMEA Technology Hub in Cluj Romania reflecting our commitment to innovation and excellence. This hub is central to our digital strategy addressing emerging challenges and enhancing service delivery through advanced technology solutions that empower our clients and promote sustainable growth.
We will count on you to:
As a Cyber Security Incident Response Analyst you will play a crucial role in analyzing security event data and responding to incidents contributing to the overall security posture of the organization.
We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts (MF SunThu TueSat). As an Analyst you will be responsible for:
Analyzing security event data assessing the potential impact of events and creating recommendations to defend against emerging threats;
Following security events through the triage and response lifecycle and documenting all processes in a centralized knowledge base;
Participating in ongoing security incidents and continuous SOC initiatives such as new content development and enrichment;
Collaborating across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies;
Work with a global team at a company with a strong brand and impressive results;
Be part of an organization with a culture of internal mobility collaboration and a drive for innovation in data & analytics including the latest AI technology;
Grow your career with direct exposure to Senior Technologists Business Leaders and Employee Resource Groups providing access to relevant volunteer and mentoring opportunities;
Analyze network traffic endpoint security events and various log sources to identify threats assess potential impacts and recommend mitigations;
Support other security functions and teams to ensure the holistic implementation of security controls technologies practices and programs;
Contribute to the development and improvement of response processes documentation tool configurations and detection logic.
Assist in additional Security Operation Center initiatives including playbook development new rule creation and tool evaluations;
Maintain operational knowledge of global threat trends known threat actors common tactics techniques and procedures (TTPs) and emerging security technologies;
Collaborate on SOC team training opportunities and other crosstraining initiatives;
Operate as a subject matter expert on various security topics across multiple domains;
Support 24x7 operations by assisting in ongoing incidents during nonstandard hours;
What you need to have:
Undergraduate degree in Computer Science (CS) Computer Information Systems (CIS) or other related degrees or equivalent experience;
2 years of information security experience and/or 24 years of experience in security analysis in a nonsecurity focused role;
Excellent critical thinking skills with proven analytical expertise and the ability to learn adaptively;
Demonstrated effective verbal written and interpersonal communication skills with the ability to communicate security concepts to both technical and nontechnical audiences;
Experience with security technologies and alerts such as intrusion prevention and detection systems web proxies SIEM SOAR EDR firewalls web application scanners vulnerability scanners forensics tools or other security technologies;
Knowledge in one or more of the following domains: Network Operations and Architecture Operating Systems Identity and Access Management Programming Cloud Computing Databases or Cryptography;
What makes you stand out
Ability to operate independently in a dynamic evolving environment with multiple inputs and tasks simultaneously;
Knowledge of common attacks current threats threat actors and industry trends;
Familiarity with common security frameworks and models such as MITRE ATT&CK Lockheed Martin Cyber Chain The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework;
Professional or technical certifications such as Security GIAC Certified Incident Handler (GCIH) Certified Ethical Hacker (CEH) or other related certifications;
Why join our team:
We help you be your best through professional development opportunities interesting work and supportive leaders;
We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have an impact for colleagues clients and communities;
Our scale enables us to provide a range of career opportunities as well as benefits and rewards to enhance your wellbeing;
A yearly budget and the opportunity to build your flexible benefits package (up to 20 of your annual salary);
30 days off 25 legal days off 1 extra day off on your birthday public holiday replacement days extra buy/sell from your benefits budget);
Performance Bonus scheme;
Matching charity contributions charity days off and the Pay it Forward charity challenge;
Core benefits Pension Life and Medical Insurance Meal Vouchers Travel Insurance;
We champion flexible working and our mission is to help you find YOUR worklife balance whether that is standard working flextime working or working from home;
Required Experience:
IC
Full-Time