Technologie Jobs

Gefundene Stellenangebote: 17 Ergebnisse
Stuttgart, Baden-Württemberg

Senior Threat Intelligence Specialist

Senior Threat Intelligence Specialist  Stuttgart  Our client, a globally recognised technology and engineering group with operations, is seeking a Senior Threat Intelligence Specialist to join its Group Information Security function. You will lead the identification, analysis, and communication of advanced cyber threats targeting the group's global operations and supply chain, working closely with SOC, Incident Response, and stakeholders to ensure the organisation maintains a proactive, intelligence-driven security posture. Key Responsibilities  Lead the production of strategic, operational, and tactical threat intelligence products for a range of audiences, from technical security teams to C-level leadership. Identify and track advanced threat actors with a focus on threats relevant to manufacturing, OT/ICS environments, and global supply chains. Apply structured analytic frameworks to assess adversary TTPs and translate findings into actionable defensive recommendations. Drive intelligence collection from OSINT, commercial feeds, and sector ISACs; manage platform quality and relevance across tooling such as Recorded Future, MISP, or equivalent. Serve as a senior point of contact for threat intelligence across internal teams including SOC, Red Team, Vulnerability Management, and OT Security. Contribute to the development and maturity of the threat intelligence programme, including metrics, processes, and junior analyst development. Key Requirements  8–12 years of cyber security experience Deep knowledge of APT groups and threat actors targeting critical industries, OT/ICS environments, and global supply chains. Proficiency with MITRE ATT&CK (including ICS matrix), structured analytic techniques, and threat intelligence platforms. Experience with operational technology (OT) security considerations and the distinct threat landscape facing industrial environments. Strong written and verbal communication skills in English; German language skills are highly desirable. Relevant certifications such as CREST CTIA, GIAC GCTI (FOR578), GICSP, or equivalent.
Weitere Informationen
NRW , Nordrhein-Westfalen

Senior IAM Architect

  Senior IAM Architect Our client is a large international organisation seeking an Enterprise Security Architect to join their Group Information Security function, with a focus on Identity and Access Management. You will sit within the Security Architecture department, responsible for the domain-specific development and ongoing enhancement of a group-wide security architecture, with the goal of ensuring and continuously improving IT security and cyber resilience across the organisation. Key Responsibilities: Analyse cybersecurity IAM trends relevant to the organisation, including regulatory developments and emerging technologies such as AI, Cloud and Non-Human Identities Produce IAM-specific risk assessments as part of technical security architecture design, covering cost, benefit and risk reduction Evaluate IAM threat scenarios and design high-level IAM security architectures, including standards, baselines and reusable artefacts such as patterns and blueprints Drive stakeholder alignment and steer solution design and implementation as subject matter expert, including presenting in group-wide security forums Assess IT security posture against best practices and provide actionable recommendations aligned to ISO and NIST frameworks Your Profile: Degree in Computer Science or a comparable qualification Extensive experience in the Identity and Access Management domain, ideally including proven delivery of IAM architecture within large organisations Strong background in security architecture roles, covering both technology-specific and enterprise-level architecture including target state definition and roadmaps Hands-on experience with IAM platforms and tooling, ideally including: IAM: Microsoft Entra ID / Active Directory, Ping Identity, Okta PAM: CyberArk / BeyondTrust IGA: SailPoint / Oracle OIG Zero Trust: NIST 800-207 Understanding of attacker mindset and offensive security; certifications such as OSCP, CEH or equivalent are advantageous Ability to work independently and take ownership of complex technical topics Strong problem-solving mindset with a structured, solution-oriented approach Fluent in English; German language skills are an advantage
Weitere Informationen
Bavaria, Bayern

SOC Lead

Director SOC Our client is a large international organisation seeking a senior leader for the newly created role of Director Security Operations. This is a central function responsible for overseeing and managing security vulnerabilities across the organisation's security landscape. You will be accountable for effective monitoring, detection and management of vulnerabilities across Cyber and Product Security, ensuring clear, organisation-wide visibility of threats and weaknesses to enable the relevant teams to act. The focus of this role is transparency, prioritisation and consistent follow-through — direct remediation and incident response are outside its scope. Key Responsibilities: Drive the development of organisation-wide security monitoring and detection capabilities Lead the enterprise vulnerability management framework, ensuring systematic identification, prioritisation and tracking of vulnerabilities across IT, cloud and product environments Build and operate a new Product Security Testing Centre, establishing scalable services for vulnerability analysis and penetration testing Provide decision-relevant situational reporting for IT operational security, product security, system owners and senior leadership including the CISO Act as the escalation point for systemic or uncontrolled vulnerabilities, ensuring transparency and clear accountability Your Profile: Proven experience leading functions in security monitoring, threat detection or vulnerability management Strong working knowledge of SIEM, vulnerability scanning and enterprise-scale testing platforms Experience independently leading an organisation-wide vulnerability management programme with the ability to prioritise on a risk basis Familiarity with product security testing, including penetration testing or fuzzing Track record of building scalable, repeatable operational processes with a focus on signal quality over tool proliferation
Weitere Informationen
Remote, Nordrhein-Westfalen

Cyber Security Engineer

Cyber Defense Consultant – Remote Freelance Position | Cologne, Germany | €700–800 per day Job Overview We are seeking an experienced Cyber Defense Consultant for a freelance engagement supporting cybersecurity operations for a client based in Cologne, Germany. This is a highly technical, hands-on security engineering and consulting role requiring deep expertise in incident response, threat detection, vulnerability management, and defensive security operations. You will be directly involved in investigating security incidents, performing forensic analysis, conducting vulnerability assessments, and working hands-on with security tools and systems. This role requires someone who can hit the ground running, provide immediate technical value, and deliver professional consulting services while defending against complex security threats. Key Responsibilities Hands-On Incident Response & Investigation Investigate and respond to security incidents from detection through containment and remediation Perform forensic analysis on compromised systems, including memory dumps, disk images, and log analysis Conduct malware analysis and reverse engineering to understand attack vectors and tactics Execute incident response procedures and technical playbooks during active security events Analyse security alerts from SIEM, EDR, and other security tools to identify genuine threats Perform root cause analysis and document technical findings for post-incident reports Engage directly with affected systems to contain threats and support recovery Security Tools & Platform Engineering Hands-on configuration and optimisation of the Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Build and tune detection rules, hunting queries, and automated response workflows Configure and maintain SIEM platforms, correlation rules, and security use cases Integrate security tools and orchestrate automated response capabilities Troubleshoot technical issues across security infrastructure and monitoring tools Test and validate security controls and detection capabilities Vulnerability Assessment & Testing Perform hands-on vulnerability scanning across infrastructure and applications Conduct penetration testing exercises to identify security weaknesses Exploit and validate vulnerabilities to assess real-world risk Analyse scan results and manually verify findings Work with technical teams to validate and test remediation efforts Maintain and configure vulnerability scanning tools and assessment platforms Threat Hunting & Proactive Defense Conduct proactive threat hunting activities across the environment Analyse network traffic, system logs, and endpoint telemetry to identify anomalies Investigate suspicious activity and potential indicators of compromise Develop and execute custom detection logic and hunting hypotheses Perform deep-dive analysis of advanced persistent threats Build custom scripts and tools to support security operations SOC Provider & Technical Coordination Work directly with external SOC analysts during incident investigations Provide technical guidance and escalation support for complex security events Review and validate alerts and findings from SOC providers Collaborate on tuning detection rules and reducing false positives Participate in technical reviews of SOC performance and capabilities Share threat intelligence and technical indicators with SOC partners Essential Requirements Technical Experience Minimum 10 years of hands-on cybersecurity experience, with at least 5 years in incident response Proven experience investigating and responding to complex security incidents Hands-on experience with vulnerability assessments and penetration testing Direct experience configuring and managing security tools (SIEM, EDR, IDS/IPS, etc.) Experience working technically with external SOC providers Strong hands-on experience with Microsoft Defender (Endpoint, Office 365, Identity, Cloud Apps) Experience performing forensic analysis and malware investigations Ability to work independently and integrate quickly into new environments Previous freelance or consulting experience in similar roles Core Technical Skills Expert understanding of incident response methodologies (NIST, SANS) Hands-on SIEM experience (Splunk, Sentinel, QRadar) Strong scripting skills (PowerShell, Python, Bash) Deep technical knowledge of Windows, Linux, and networking Experience with forensic tools (EnCase, FTK, Volatility) Packet analysis skills (Wireshark, tcpdump) Malware analysis techniques and tooling Penetration testing tools (Metasploit, Burp Suite, Nmap) Strong knowledge of MITRE ATT&CK and kill chain models Practical cloud security experience (Azure, AWS, or GCP) Language Requirements Fluent English (written and spoken) German language skills are essential Security Frameworks & Standards Practical knowledge of ISO 27001, NIST CSF, and CIS Controls Understanding of GDPR, PCI-DSS, SOX, and related regulations Experience validating and testing security controls Consulting Skills & Attributes Hands-on technical problem solver Able to make decisions under pressure during live incidents Self-starter who adapts quickly to new environments and tools Strong client-facing communication skills Professional consulting demeanour and presentation style Highly analytical with strong attention to detail Comfortable working in command-line environments Passion for emerging threats and attack techniques Excellent documentation and report-writing skills Ability to provide strategic security recommendations alongside implementation Desirable Banking or financial services sector experience Experience with SOAR platforms and security automation Background in offensive security or red teaming CTF participation or security research contributions Experience with threat intelligence platforms Cloud-native and container security experience Freelance Engagement Details Engagement Type: Freelance contract (Freiberufler) Location: Cologne, Germany (Köln) Duration: 12 months Work Model: Remote (German-speaking environment) Start Date: March 2026 Rate: Competitive daily rate based on experience Requirements: Valid German work permit or EU right to work Business Registration: Freiberufler or own company (GmbH / UG)
Weitere Informationen
Oslo , Oslo

Interim CISO

Interim Cybersecurity Lead / Operating Advisor (Technical CISO) - 9 months Flexible Hybrid - Munich - Oslo - London - Stockholm Sector: Growth Equity / Private Equity About the Client Our client is a leading European growth equity investor partnering with technology-enabled and sustainable businesses. The portfolio consists primarily of high-growth companies across sectors such as SaaS, fintech, deeptech, healthtech and digital platforms. The firm takes a hands-on approach to value creation, working closely with management teams to scale operations, strengthen capabilities and prepare businesses for exit. Cybersecurity is a key part of this — both as a risk management discipline and a value creation lever. The Role We are seeking an Interim Cybersecurity Lead / Technical CISO to cover a period of paternity leave. This is a portfolio-facing, high-impact role operating at the intersection of: Investment (sourcing and due diligence) Portfolio value creation (hands-on advisory) Community and capability building across companies This is not a traditional internal CISO role. The primary focus is external: supporting multiple high-growth companies, contributing to investment decisions, and translating cybersecurity into practical, commercially relevant outcomes. You will act as a trusted advisor to investment professionals, founders and executive teams, helping identify risk, unlock value and scale cybersecurity capabilities across a diverse portfolio. We are looking for someone pragmatic, commercially minded and comfortable operating in fast-moving environments — someone who understands what “good” looks like for a growth-stage company and can prioritise accordingly. Key Responsibilities Investment & Sourcing Support cybersecurity across the full investment lifecycle, from early-stage screening to due diligence Engage with investment teams to assess targets, products and architectures from a cybersecurity perspective Provide clear, investment-relevant assessments: risks, red flags and value creation opportunities / risk mitigation actions Evaluate whether a company’s security posture supports or undermines the investment thesis Translate technical findings into concise, decision-useful insights for investment teams Portfolio Value Creation Act as a trusted advisor to portfolio companies on cybersecurity Support prioritisation and execution of pragmatic improvements Advise on regulatory developments, customer requirements and scaling security capabilities Focus on practical impact over theoretical maturity Community & Capability Building Develop and maintain the cybersecurity community across portfolio companies Facilitate knowledge sharing and peer learning Lead targeted sessions (e.g. workshops, webinars) on relevant, real-world challenges AI & Emerging Technology Stay ahead of developments in AI and their cybersecurity implications Identify and promote practical applications of AI to improve security and efficiency Support portfolio companies in adopting AI-driven workflows securely and effectively Contribute to the firm’s broader perspective on AI and technology Internal & Governance (Limited Scope) Provide pragmatic input on internal cybersecurity where required (this role is not responsible for cybersecurity internally) Support investor-related requirements and expectations Your Profile Experience as a CISO, Head of Cybersecurity, or equivalent senior role Strong mix of technical depth and business understanding (cloud, SaaS, modern architectures) Experience from high-growth environments, scale-ups, or advisory roles Ability to assess cybersecurity in an investment context (risk, value, trade-offs) Comfortable operating across multiple companies simultaneously Strong communicator — able to engage credibly with executives, founders and investors Pragmatic and outcome-oriented — understands when “good enough” is the right answer Hands-on and adaptable — able to move between strategy and execution Familiarity with AI tools and their application to cybersecurity Consultancy experience is advantageous but not required What Success Looks Like Investment teams receive clear, decision-useful cybersecurity input Portfolio companies make tangible, prioritised improvements Cybersecurity is positioned as a business enabler, not just a control function A strong community and knowledge-sharing culture is established across the portfolio What This Role Is Not A traditional, internally focused CISO role A pure governance or compliance position A large-scale enterprise transformation programme A theoretical advisory role disconnected from execution
Weitere Informationen