#BlackCell #Careers
Great futures start here
Get to know us
Black Cell is a professional cybersecurity company providing end-to-end cybersecurity assurance within its Fusion Center, Integration, Offensive Security and Compliance solution areas, as well Cloud Security and ICS/OT Security specializations. Our goal is not only advising to the best of our knowledge, but creating bespoke and resilient cybersecurity ecosystems.
Black Cell is a pioneer in its niche market, provisioning high quality services to every single client, regardless of the size of the business or the size of the individual deal. We act fast, are dedicated to solve complex problems and work flexibly to meet the most rigorous expectations.
Explore our job opportunities
Why join Black Cell?
Opportunity for growth
Performance bonus
Family-friendly workplace
Hybrid work
Teams matter
Refuel
Information Security Expert (Consultant)
Scope of duties
Performing client-specific risk analyses and business impact analyses.
Creating and maintaining business continuity management systems.
Conducting audits related to the security of cloud services and creating a GAP analysis.
Supporting information security compliance and the preparation for certification audits of organizations with diverse profiles.
(Pro)active participation in the operation of quality assurance and information security management systems.
Contributing to the preparation of client/internal policies, rules, and documents, as well as comprehensive reports.
Requirements
Knowledge of standards related to IT security (e.g. ISO/IEC 27001:2013 and 27001:2022), frameworks (e.g. NIST SP800-53 Rev4 and Rev5), recommendations (recommendation of the Hungarian National Bank on IT system protection), and related domestic legislation (e.g. Act L. of 2013 and its implementing regulations), and knowledge of current best practices.
Excellent oral communication and cooperation skills, openness, and high level of written expression.
Confident knowledge of the English language, both written and spoken (interpretation and processing of materials in English, participating in meetings with international customers).
Skills of Office applications (Excel, Word, Outlook).
Creative handling of unexpected situations and challenges.
Proactivity, ability to prioritize.
Team spirit, enthusiasm, auditory attitude.
Learnability, ability to develop.
Desirable (but not essential) experience
Internal and/or lead auditor certificate of ISO/IEC 27001:2013.
Higher degree in IT and/or information security, or ongoing studies in this direction.
Category B driver’s license and being an experienced driver.
Conversational English or German language skills.
Employee benefits
You can receive a competitive salary, supplemented by a performance-related bonus.
We can make easier your onboarding process by supporting you in several ways (with training, mentoring, courses).
We provide opportunities for continuous competence development, achieving professional (e.g. CISA, CISM, CISSP, CIPP-E, CIPP-US) or other certifications (e.g. Microsoft Cloud Security), considering your development needs.
You can participate in team building trainings regularly to fit in and find your place in our community.
We provide a notebook and telephone for your work.
The position is for you if
You would like to develop yourself and use your knowledge in practice at both small and medium-sized enterprises and multinational companies.
You are interested in the field of cloud services and would like to expand your knowledge on this subject.
You are happy to use your English language skills during work.
You understand the essence and the objectives of information security, moreover you want to improve the resilience of critical infrastructures.
You would like to work effectively in a young, purposeful team.
Senior Security Operations Center [SOC] Specialist
Scope of duties
- Design, implementation, management and optimisation of Security Incident and Event Management tool [SIEM] (SIEM solutions in scope: Splunk Enterprise, Microsoft Sentinel and IBM QRadar)
- Steer work on the operation of current and future toolsets that will support the SOC development, as per current understanding of future scenarios; namely alerting, monitoring and reporting
- Continuous monitoring and processing of security events escalated by Level 1 SOC Analysts
- Mentor and support analysts within Security Operations Centre (SOC) to drive high quality and strong performance
- Evaluate and adapt SIEM event rules, filters and use cases
- Support SOC development roadmap by delivering Black Cell SOC capabilities to the business and championing new ideas and initiatives to help improve new and existing services
- Represent the SOC team at internal and external meetings and forums as agreed by the SOC Manager
- Recognize potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
Requirements
- Advanced IT knowledge in: Operating systems (Windows,Linux) and IT networking
- Minimum 1 year IT relevant experience
- Good problem-solving and analytical skills
- Advanced level of English
- Be able to multi-task and be pro-active in addressing issues and requests
- Possess the ability to adjust and adapt to changing priorities in a dynamic environment
- Possess an understanding of security standards and risk management
- Ability to work independently
- Great attention to detail
- Excellent communication and organizational skills
- High sense of urgency
Desirable (but not essential) experience
- Experience with Proactive Threat hunting service and/or Threat Intelligence Platforms and/or Security Orchestration Automation and Response [SOAR] solutions
Employee benefits
- Paid training and development
- Becoming Certified Microsoft Security Professional via joint training agreement between Black Cell and Microsoft
- Company equipment (laptop, smartphone with subscription)
- Remote work flexibility
- Performance Bonus
- Regular team building events
- Unlimited coffee consumption (in the office)
Level 1 Security Operations Center [SOC] Analyst
Scope of duties
- Monitoring and analysis of cyber security events
- Services monitored include SIEM [IBM QRadar, Splunk Enterprise and Microsoft Sentinel], IDS/IPS, Firewall, Web Application Firewalls, Data Loss Prevention (DLP) and Microsoft Security solutions (such as Microsoft 365 E5 Security or Azure Sentinel)
- Security Event Correlation and Reporting to appropriate Tier 2 Security Analyst or Incident Response staff or relevant sources to determine increased risk to the business
- Recognize potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
Requirements
- Basic IT knowledge in: Operating systems (Windows, Linux) and IT networking
- Good problem-solving and analytical skills
- English intermediate level skill
- Be able to multi-task and be pro-active in addressing issues and requests
- Possess the ability to adjust and adapt to changing priorities in a dynamic environment
- Ability to work independently
- Willingness to work in a multi-shift work schedule
- Great attention to detail
- Excellent communication skills
- High sense of urgency
Desirable (but not essential) experience
- Experience with SIEM, IDS/IPS, Firewall, Web Application Firewalls, Data Loss Prevention (DLP) and Security Event Correlation
Employee benefits
- Paid training and development: Becoming Certified Microsoft Security Professional via joint training agreement between Black Cell and Microsoft + other vendor specific trainings
- Company equipment (laptop, smartphone with subscription)
- Remote work flexibility
- Performance Bonus
- Regular team building events
- Unlimited coffee consumption (in the office)