We've detected you're from the Netherlands, if you'd like you can view this page in Dutch!

View Dutch Stay here

We've detected you're from Germany, if you'd like you can view this page in German!

View German Stay here

SOC Analyst

SOC Analyst

Berlin, Permanent

Orange Quarter are working with a Fintech who provide simple and scalable access to alternative funding pools at low at variable costs. This company is the leading savings and investment platform to operate across Europe, and they link up private customers with banks and their individual country platforms. One of the most well-funded Fintech startups in Europe, they are backed by well-known investors including PayPal.



What to expect:

Given the industry they operate in, IT Security is of huge importance to this company. They are currently scaling up their Security Team and are looking for a SOC Analyst. You’ll be working closely with the Application Security Support Engineering Team and the Security Architect. You’ll be part of the team responsible for 24/7 monitoring and alerts and will be doing active monitoring of Security events using SIEM. You’ll also create new rules, dashboards and correlations and reports, and will handle the escalations from the Application Support Team.

You’ll also be monitoring data sources, will convey any shortcomings immediately to the affected team. You should understand vulnerabilities in OS, Applications, Network devices and perform routine vulnerability assessments.


  • Generous personal development/ wellbeing budget
  • Flexible working hours and the option to do home office
  • Subsidised Urban Sports Club membership
  • Corporate Pension Scheme
  • Regular team events, so you can enjoy time with your colleagues


  • You have a completed degree in Computer Science, Information Security, Information Systems, or a related field
  • You know a strong knowledge of Network Protocols, AWS Cloud Security, WAF, Firewalls and Database and Web Application Security
  • You have experience in SOC monitoring and security log analysis
  • You have experience working with Splunk and other SIEM tools including Qradar, LogRythym, ArcSight, McAfee Nitro and AlienVault USM Anywhere
  • Experience of Cyber Threat Intelligence or Threat Hunting
  • In depth knowledge of cyber attack methods
  • 4+ years of experience of cyber attack monitoring and incident handling

Sounds good?

Apply now
For more information, connect with our specialised team member on LinkedIn Poppy Ashmore