About the Company
Bruker is a global leader in scientific instrumentation and solutions, empowering innovation across life sciences, healthcare, and advanced materials. With a commitment to excellence and cutting-edge technology, we deliver precision tools that enable breakthroughs in research and industry. Our cybersecurity team plays a critical role in safeguarding Bruker’s digital ecosystem, ensuring resilience against evolving threats and protecting the integrity of our global operations.
For more information, please visit www.bruker.com
About the Role
As a Security Operations Center (SOC) Analyst – L1, you will be the first line of defense against cyber threats. You will monitor, analyze, and respond to security incidents, ensuring the confidentiality, integrity, and availability of critical systems. This role requires strong technical expertise, analytical skills, and a proactive approach to threat detection and mitigation.
Key Responsibilities
- Monitor and analyze security alerts from SIEM and XDR platforms. (Microsoft Defender and Microsoft Sentinel Preferred)
- Investigate and respond to security alerts coordinate further steps with L2 for containment, eradication, and recovery.
- Investigate phishing alerts.
- Utilize frameworks like MITRE ATT&CK and Cyber Kill Chain for threat modeling and hunting.
- Prepare detailed incident reports and trend analysis for stakeholders.
Required Skills & Qualifications
- Education: Bachelor’s degree in Computer Science, Information Technology, or related field.
- Experience: 2–3 years in SOC operations or cybersecurity roles.
- Hands-on experience (minimum 1 year) with Linux/Unix OS administration and security.
- Strong knowledge of Microsoft XDR and Microsoft Sentinel for threat detection and response.
- Proficiency in KQL for log analysis and custom detection rules.
- Solid understanding of incident handling processes (containment, eradication, recovery).
- Familiarity with phishing investigation techniques and email security best practices.
- Knowledge of MITRE ATT&CK framework, Cyber Kill Chain, and threat hunting methodologies.
- Experience in managing and securing Azure Virtual Machines.
- Strong analytical and problem-solving skills with attention to detail.
- Excellent communication and reporting skills for cross-team collaboration.
Why Join Us?
- Opportunity to work with cutting-edge cybersecurity technologies.
- Collaborative and growth-oriented work environment.
- Continuous learning and professional development programs.