12 days ago - req31919

SOC Analyst (Job starter)

Other corporate functions

Computer science & software engineering

In a nutshell

Location

Veldhoven, Netherlands

Team

Other corporate functions

Experience

No experience (Student)

Degree

Bachelor

Job Category

Computer science & software engineering

Travel

No

Introduction to the job

Are you a passionate job starter with a passion for IT Security and a curiosity for how things work? We are looking for you to join our growing Cyber Defense Incident response team.

ASML brings together the most creative minds in science and technology to develop lithography machines that are key to producing faster, cheaper, more energy-efficient microchips. We design, develop, integrate, market and service these advanced machines, which enable our customers - the world’s leading chipmakers – to reduce the size and increase the functionality of their microchips, which in turn leads to smaller, more powerful consumer electronics.

The Cyber Defense Center (CDC) within ASML (Veldhoven office) minimizes the damage caused by threat actors bypassing ASML’s preventative security controls through real-time detection & response and therefore protecting ASML assets. By constantly acting on alerts and by improving and adapting our monitoring controls we enable ASML to operate in an increasingly hostile environment. We work together closely with other security functions and other ASML teams utilizing our shared in-depth knowledge in this effort to secure the business for all our stakeholders. To improve our Incident Response services we are looking for a skilled professional in this area to complement and support our growing team.

Role and responsibilities

Protect ASML against internal and external threats by analyzing, tracking and handling security incidents. Continually watch and respond to security alerts (triage) and work with the 2nd and 3rd line for escalations of notable incidents.

Your responsibilities
- Monitor and triage any tickets, alerts or requests to identify potential security incidents in a timely manner.
- Classify incidents correctly and if needed escalate them to 2nd line.
- Ensure all alerting queues in the security portals are up to date to accurately reflect the follow-up status
- Respond to immediate threats by containing the malicious activity and minimizing the business impact.
- Participate in the on-call rotation schedule for a couple of weeks a year. In these weeks you will be expected to be available 24/7 to handle any escalations from the tooling or stakeholders outside business hours.
- Execute and improve standard operating procedures to handle incidents in an adequate manner.
- Ensure security tickets are processed effectively and timely by chasing external stakeholders and executing tasks promptly.
- Ensure accurate and timely registration and documentation of security tickets for reporting and handover efforts.
- Identify and group any related security tickets based on the incident indicators for accurate threat information collection.
- Contextualize IOCs identified and group by security tooling to better understand their relevance.

Education and experience

- Bachelor or Master’s degree in Cyber Security, Computer Science or equivalent combination of education and work experience.

- 0-6 months of experience working in an analyst/incident responder role within an enterprise environment

- General (information) security-related certifications are a pre.

Knowledge of:
- the Cyber Kill Chain & MITRE ATT&CK framework;
- Networking concepts, including TCP/IP protocols and network topology;
- Proficient in English (business language);
- Experience in a scripting language;
- Have a passion for security and is aware of the latest news within the field.

Skills

Working at the cutting edge of tech, you’ll always have new challenges and new problems to solve – and working together is the only way to do that. You won’t work in a silo. Instead, you’ll be part of a creative, dynamic work environment where you’ll collaborate with supportive colleagues. There is always space for creative and unique points of view. You’ll have the flexibility and trust to choose how best to tackle tasks and solve problems.
To thrive in this job, you’ll need the following skills:

- Ability to take decisive action based on available information in a timely manner;
- Ability to research and characterize security threats to include identification and classification of threat indicators;
- Critical thinking and contextual analysis abilities;
- Investigative and analytical problem solving skills;
- Teamwork, can-do mentality;
- Stress-resistant and natural multi-tasker;
- Strong time management skills and willing to go above and beyond where required.

Diversity & Inclusion

ASML is an Equal Opportunity Employer that values and respects the importance of a diverse and inclusive workforce. It is the policy of the company to recruit, hire, train and promote persons in all job titles without regard to race, color, religion, sex, age, national origin, veteran status, disability, sexual orientation, or gender identity. We recognize that diversity and inclusion is a driving force in the success of our company.

Other information

- Willing to work 7/8 weeks in a year in 24/7 standby shifts to be available for escalations outside business hours.

Role name: SOC analyst – Tier 1
Maturity level: Junior
CDO Value stream: Incident response & Investigation

Need to know more about applying for a job at ASML? Read our frequently asked questions.