Your Challenge

You’ll move the world forward. Every day, you be part of creating the most innovative mapping and location technologies to shape tomorrow’s mobility for the better.

This company is proud to be one team of more than 5,000 unique, curious, passionate problem-solvers spread across the world. Bringing out the best in each other. And together, help the automotive industry, businesses, developers, drivers, citizens and cities move towards a safe, autonomous world that is free of congestion and emissions. This is what you will do:

  • Monitor, triage, investigate, and respond to suspicious activity across all company assets. 
  • Perform log analysis and analyse datasets to support alert and response activities. 
  • Provide data driven insights to improve cybersecurity operations. 
  • Create & maintain detection use cases & implement improvements. 
  • Interface with other teams as required. 
  • Perform root cause analysis of security issues. 
  • Use a combination of manual and automated tools to proactively analyse various data. 
  • Help stakeholders to determine the best course of action to remedy the problem 
  • Work effectively with team members and leadership by communicating cybersecurity trends and sharing ideas and knowledge in a constructive and positive manner; 
  • Actively participate in their goal to continuously improve the way of working; identify improvement areas on the technology, process and techniques to enhance the detection and response capabilities. 
  • Ensure the ongoing core objectives of the CSIRT are accomplished and measurable. 
  • Be a part of the Security on-call rota

This is you

  • Minimum 3+ years working in security practices (CSIRT/SOC experience preferred); 
  • Demonstrable experience of the incident response lifecycle at both technical and procedural level; 
  • Demonstrable experience performing incident response across different operating systems 
  • Ability to quickly solve problems using scripting and automation; 
  • Strong understanding of IT fundamentals across networking, system, and application layers; 
  • Strong understanding of Cloud infrastructure & experience of incident response in cloud environments. 
  • Proven ability to prioritize incoming escalations and requests appropriately using clear communications; 
  • Excellent interpersonal and communication skills in order to share knowledge with peers and to communicate effectively with different stakeholders; 
  • Strong knowledge of Endpoint Detection and Response (EDR) tools for incident analysis; 
  • Expert knowledge of Security Incident & Event Monitoring (SIEM) tools for incident analysis; 
  • Willingness to be part of an on-call rota for out of hours escalations

What’s nice to have

  • 5+ years working in an enterprise level organization with responsibilities related to computer security or system administration 
  • Experience in the automation & orchestration of security playbooks (SOAR) 
  • Strong written and verbal communication skills 
  • SANS certifications (GCIH, GFNA, GCIA, GSEC, etc.) 
  • Experience working with distributed teams 



Please apply here or contact Stela Staleva at +31 (0)6 41 11 09 67 or at for more information.

To apply for this job email your details to