CSIRT Security Investigator

Legal, Compliance, Risk and Assurance

In a nutshell


Veldhoven, Netherlands


Legal, Compliance, Risk and Assurance

Educational Background

Other technical backgrounds

Remote Work


Time Type

Full time

NEW Job ID: J-00284077
Are you an experienced Cyber Analyst with a passion for IT Security and a curiosity how things work, we are looking for you to join our growing Cyber Defense Incident Response team. 




ASML brings together the most creative minds in science and technology to develop lithography machines that are key to producing faster, cheaper, more energy-efficient microchips. We design, develop, integrate, market and service these advanced machines, which enable our customers - the world’s leading chipmakers – to reduce the size and increase the functionality of their microchips, which in turn leads to smaller, more powerful consumer electronics. 


The Cyber Defense Center (CDC) within ASML (Veldhoven office) minimizes the damage caused by threat actors bypassing ASML preventative security controls through real time detection & response and therefore protecting ASML assets. By constantly acting on alerts, improving and adapting our monitoring controls we enable ASML to operate in an increasingly hostile environment. We work closely together with other security functions and other ASML teams utilizing our shared in depth knowledge in this effort to secure the business for all our stakeholders. To improve our Incident Response services we are looking for a skilled professional in this area to complement and support our growing team. 


Job Mission 

You will continually watch and respond to security alerts (triage) and work with the Security Operations Center in escalations of notable incidents. You will investigate complex security incidents in close collaboration with Insider Risk and Legal teams. You participate in continuous process improvements in order to keep up with the developing threat landscape. 


Your responsibilities 

  • Respond to medium and high priority incidents by going through the incident lifecycle 

  • You will run confidential investigations with an insider risk aspect independently, reporting into the Head of Cyber Defense

  • You will provide close support to the team lead Security Investigations and will function as dedicated delegate during absence

  • Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations   

  • Carry out the Duty Officer role & CSIRT second line standby role on a periodic basis 

  • Create and optimize playbooks and workflows both for the SOC and for the CSIRT 

  • Support in the design and configuration of new incident response and investigative capabilities 

  • Help in identifying maturity gaps and lack of coverage in current capabilities and define plans for remediation 

  • Coach and provide guidance to L1 analysts 

  • Support in the development of threat management capability roadmaps 


Level of education 

Bachelor or Master’s degree in cyber security, Computer science or equivalent combination of education and work experience 


3-5 years of experience working in an analyst/incident responder role within an enterprise environment 



  • Ability to take decisive action based on available information in a timely manner; 

  • Ability to research and characterize security threats to include identification and classification of threat indicators; 

  • Experienced in reporting to senior executives;

  • Critical thinking and contextual analysis abilities; 

  • Investigative and analytical problem solving skills;  

  • Teamwork, can-do mentality; 

  • Stress resistant and natural multi-tasker 

  • Strong time management skills and willing to go above and beyond where required 

  • Teaching and coaching ambition for junior team members 


Knowledge on 

  • Host forensics, network forensics, log analysis and malware (static/dynamic analysis) triage 

  • Security ticketing systems and basic SOC procedures 

  • Security tools e.g. log management tools, endpoint and network security controls 

  • Networking concepts, including TCP/IP protocols and network topology 

  • Proficient with scripting programming e.g. Bash, PowerShell, Python 

  • Automation incident response workflow 

  • the Cyber Kill Chain & MITRE ATT&CK framework 

  • vulnerabilities, research & testing, tinkering and pulling things apart  

  • the current vulnerabilities, response, and mitigation strategies used in cyber security;  

  • Proficient in English (business language) 


Willing to work 5/6 weeks in a year in 24/7 on-call shifts to be available for escalations outside business hours.  


Learn more about this job