Job Title: L3 SOC Analyst & Detection Engineer
Location: Brussels Belgium (Hybrid / Remote option available)
Role Overview:
This role focuses on advanced cybersecurity operations within a Security Operations Center (SOC). The L3 SOC Analyst & Detection Engineer leads complex incident investigations supports escalation from L1/L2 teams and enhances detection and response capabilities through continuous improvement and threat-driven engineering.
Key Responsibilities:
- Lead investigation and resolution of high-severity security incidents
- Perform advanced forensic analysis and root cause investigations
- Conduct proactive threat hunting using threat intelligence and behavioral analysis
- Design develop and optimize SIEM/EDR/XDR detection rules and correlation logic
- Translate MITRE ATT&CK techniques into actionable detection use cases
- Reduce false positives and improve detection accuracy
- Support SOC automation playbooks and process improvements
- Mentor junior analysts and contribute to SOC maturity and reporting
- Participate in purple teaming and adversary simulation exercises
Core Skills Required:
- Strong experience in L3 incident response and SOC operations
- Expertise with SIEM tools (e.g. Splunk Microsoft Sentinel) and EDR/XDR (e.g. Microsoft Defender)
- Advanced knowledge of threat hunting and malware analysis
- Experience with detection engineering and use case development
- Proficiency in KQL and scripting for security automation
- Familiarity with MITRE ATT&CK and security frameworks
- Knowledge of Linux and Windows environments
- Strong communication analytical and collaboration skills
Languages:
- Dutch or French (native/bilingual)
- English (professional working proficiency)
Additional Requirement:
- Must consent to a mandatory security clearance process (up to 30 days) with continued availability during screening.
Focus of the Role:
Strengthening SOC detection capabilities improving threat visibility and ensuring rapid effective response to advanced cyber threats in a highly regulated financial environment.
Job Title: L3 SOC Analyst & Detection Engineer Location: Brussels Belgium (Hybrid / Remote option available) Role Overview: This role focuses on advanced cybersecurity operations within a Security Operations Center (SOC). The L3 SOC Analyst & Detection Engineer leads complex incident investigations ...
Job Title: L3 SOC Analyst & Detection Engineer
Location: Brussels Belgium (Hybrid / Remote option available)
Role Overview:
This role focuses on advanced cybersecurity operations within a Security Operations Center (SOC). The L3 SOC Analyst & Detection Engineer leads complex incident investigations supports escalation from L1/L2 teams and enhances detection and response capabilities through continuous improvement and threat-driven engineering.
Key Responsibilities:
- Lead investigation and resolution of high-severity security incidents
- Perform advanced forensic analysis and root cause investigations
- Conduct proactive threat hunting using threat intelligence and behavioral analysis
- Design develop and optimize SIEM/EDR/XDR detection rules and correlation logic
- Translate MITRE ATT&CK techniques into actionable detection use cases
- Reduce false positives and improve detection accuracy
- Support SOC automation playbooks and process improvements
- Mentor junior analysts and contribute to SOC maturity and reporting
- Participate in purple teaming and adversary simulation exercises
Core Skills Required:
- Strong experience in L3 incident response and SOC operations
- Expertise with SIEM tools (e.g. Splunk Microsoft Sentinel) and EDR/XDR (e.g. Microsoft Defender)
- Advanced knowledge of threat hunting and malware analysis
- Experience with detection engineering and use case development
- Proficiency in KQL and scripting for security automation
- Familiarity with MITRE ATT&CK and security frameworks
- Knowledge of Linux and Windows environments
- Strong communication analytical and collaboration skills
Languages:
- Dutch or French (native/bilingual)
- English (professional working proficiency)
Additional Requirement:
- Must consent to a mandatory security clearance process (up to 30 days) with continued availability during screening.
Focus of the Role:
Strengthening SOC detection capabilities improving threat visibility and ensuring rapid effective response to advanced cyber threats in a highly regulated financial environment.
View more
View less