Overview & Purpose
SOFTSWISS continues to expand the team and is looking for an Incident Response Analyst. We need a true, experienced, and accomplished professional who shares our culture and values.
Purpose of the Role
You’ll help protect our iGaming services, working closely with IT and product teams to ensure security and stability across our ecosystem.
Key Responsibilities
- Upgrade SOC processes & response automation.
- Respond to cybersecurity incidents.
- Immerse yourself in the specifics of systems and processes to achieve a balance of security and performance.
- Investigate security incidents and instigate remedial measures to address breaches.
- This position follows a 2-on-2-off rotating schedule:
- 12-hour day shift.
- Followed by a 12-hour night shift the next day. Incident Response Analyst Job - Vacancy in Poland, Georgia, Malta & Remote | SOFTSWISS Careers
Our stack
- Splunk, Clickhouse, Gitlab, Python, ELK, Wazuh.
Required Experience
- 1+ year of experience as an information security engineer or analyst.
- Experience with SIEM, EDR, IDS/IPS, IRP/SOAR events analysis.
- Familiarity with SecOps processes (monitoring, triaging, investigating, threat intelligence). Incident Response Analyst Job - Vacancy in Poland, Georgia, Malta & Remote | SOFTSWISS Careers Incident Response Analyst Job - Vacancy in Poland, Georgia, Malta & Remote | SOFTSWISS Careers
Nice to Have
-
Incident Response Analyst Job - Vacancy in Poland, Georgia, Malta & Remote | SOFTSWISS Careers
Incident Response Analyst Job - Vacancy in Poland, Georgia, Malta & Remote | SOFTSWISS Careers
- Strong understanding of attack pipelines (MITRE ATT&CK Framework, Cyber Kill-Chain).
- Experience with Clickhouse, Splunk, Kafka, ELK, Graylog, etc.
- Strong Linux system administration experience.
- Familiarity with CI/CD, software development lifecycle, Infrastructure-as-Code (Terraform/Ansible/etc). Incident Response Analyst Job - Vacancy in Poland, Georgia, Malta & Remote | SOFTSWISS Careers
- Experience with log collection, delivery, and normalisation.
- Strong knowledge in open-source endpoint & infrastructure security tools (Audit.d, Sysmon, AppArmor, SELinux, etc.).
- Basic static and dynamic malware analysis.
- Offensive experience (penetration testing, red teaming)
Learn more about our hiring process here – what to expect, how to prepare, and what makes SOFTSWISS different.