On behalf of our client, a well-known company from the insurance industry based in Wiesbaden, we are looking for a Security Engineer (m/f/d) as the technical backbone for the cyber defense strategy.
Here's what our clients offer
 1. A permanent contract with a crisis-proof employer.
 2. An attractive, collectively agreed salary with extensive social benefits (e.g. company pension scheme).
 3. Flexible working time models and the option of mobile working.
 4. A modern working environment and targeted support for your professional development.
 5. A responsible position at the heart of the Cyber Defense strategy.
Your tasks
In this central role, you will be responsible for the SIEM platform (Cisco Splunk) and the data pipelines (Cribl) that process all security-relevant information.
Important: You are not part of the 24/7 monitoring team (this is handled by an external SOC). Your task is to provide this SOC with the best possible technical platform and database for the analysis and to manage the collaboration.
Your core tasks
 6. Administration, further development and documentation of the central IT security infrastructure
 7. Focus on Security Information & Event Management (SIEM) with Cisco Splunk
 8. Responsibility for log management and data pipelining with Cribl
 9. Operation, hardening and optimization (security, network, performance) of the underlying Linux servers (RHEL)
 10. Control of vulnerability & patch management (Tenable / HCL BigFix)
 11. Technical coordination and control of the external Security Operations Center (SOC)
 12. Close coordination with internal specialist departments (e.g. network, cloud)
 13. Technical implementation of regulatory requirements (e.g. DORA) within the SIEM platform
Your strength:
You are the "data architect" for security logs and understand how to derive the necessary monitoring requirements from architecture plans (DMZ, ZeroTrust).
Your profile
 14. Completed studies in computer science, business informatics (or similar) and at least 3 years of professional experience in the IT security environment OR
 15. Completed IT training (e.g. IT specialist) and at least 5 years of professional experience in the IT security environment.
 16. Sound experience in the administration and engineering of SIEM platforms (ideally Splunk) and log management solutions (ideally Cribl) based on Linux (RHEL)
 17. Experience in vulnerability management (e.g. Tenable)
Contextual knowledge: You do not need to administer the following systems yourself, but understand how to tap into and interpret their data:
 18. Firewall & VPN (Check Point / Forcepoint)
 19. Network Access Control (Forescout)Virtual Network Environments (VMware NSX)
 20. Cloud platforms (Hyperscaler)
 21. Very good knowledge of German (written and spoken)
 22. Good knowledge of English (written and spoken)