Join Maersk’s Groundbreaking Cyber Team: Redefining Incident Management & Response
Imagine a career where you're not just responding to security incidents—you’re revolutionising how it’s done. At Maersk, one of the world’s largest and most respected logistics and shipping companies, our Cyber team is pioneering a whole new approach to incident response. This isn’t your typical SOC/CERT role: our combined fire team approach team is built on cutting-edge research and designed to drive change, resilience, and agility in ways the industry has never seen before.
Here, you’ll be part of a dynamic team that works together to defend, adapt, and innovate with freedom and purpose. You won’t just work on IR; you’ll help improve how it’s done. Dive into purple teaming, create and refine world-class detections, shape change projects, and push the boundaries of what’s possible—all during the workday with no overnight shifts. Plus, we champion continuous learning and growth through Capture the Flag (CTF) exercises and direct opportunities to bring your ideas to life.
Are you ready to be part of something transformational at Maersk and join a team that’s setting a new standard in cybersecurity?
- Join a World-Class Cyber Team: Be part of an elite cyber operation at one of the globe’s most renowned logistics companies, where your contributions truly make a difference.
- Multidimension role to Keep You Engaged: Unlike any traditional SOC role, as a CERT analyst in Maersk, you’ll engage in a variety of activities, switching between defensive and offensive strategies, conducting threat hunts, and participating in innovative projects and research. This multifaceted approach ensures you won’t experience burnout like in a typical SOC role.
- Continuous Learning & Dynamic Environment: Enjoy ongoing training and development in a fast-paced, stimulating atmosphere. Participate in exciting CTF competitions alongside a team of experts, pushing the boundaries of your knowledge and skills.
- Using cutting edge technologies: Tackle complex cyber incidents that require innovative solutions and utilizing the latest technologies available in the market. Your expertise will be crucial in addressing and mitigating sophisticated threats, allowing you to hone your skills in a real-world environment.
Innovate and Impact: Engage in innovative projects that allow you to bring your ideas to life, help shape the future of cybersecurity while developing new capabilities that enhance our operations.
*
Key responsibilities
Cyber Incident Response and event management
- Contributing to the response efforts for security incidents, managing triage, containment, documentation, and the reporting process.
- Contribute to the Cyber Incident Response process from a technical perspective and provide effective management of all cyber incidents.
- Supporting the Incident Manager in driving post-incident reviews
- Collaborate with global stakeholders in technical conversations, to align response efforts and communicate effectively across technical audiences during incidents.
- Leverage Incident Analysis context to help identify gaps and improve detection and response capabilities by fine-tuning use cases, developing automation, and documenting processes.
- Respond to the incident and manage the tickets end to end with a good quality.
- Conduct host and network investigations to detect and mitigate malicious activities using tools like Sysinternals, Wireshark, and TCPDump.
- Log analysis across OS, web applications, network devices, and security tools (e.g., Anti-malware, EDR, IDS, WAF, DLP).
Research and Intelligence Gathering: Proficiency in OSINT tools like Shodan and VirusTotal.
*
Cloud Security Knowledge
Knowledge of cloud technologies and security (e.g., AWS, Azure, Alibaba, Google Cloud), with skills in performing investigations, log analysis, and incident response is desirable
*
OT/IOT
Understanding of OT environments and security is desirable but not essential
*
OS Security Knowledge
- Knowledge of operating systems, OS-level exploits, and cybersecurity for Windows and Linux, including OS hardening techniques.
Knowledge of how to locate, analyze, and interpret forensic artifacts in Windows and Linux during investigations (e.g., registry, event logs, browser history, memory dumps) using tools like Volatility and FTK is desirable
*
Application Security Knowledge
- Familiarity with application-level attacks, prevention methods, hardening configurations, and log analysis for applications like web applications and databases is desirable
An understanding of malware behaviour, persistence mechanisms, and the ability to perform static and dynamic analysis, including sandbox report interpretation and reverse engineering.
*
Purple Teaming
- Knowledge of various cyber-attacks, simulations, and identification methods.
Keen to participate in purple teaming activities, helping to develop scenarios and engage in both blue and red team activities. Some experience with tooling such as Metasploit, Nmap, Cobalt Strike, Hydra, John the Ripper, Burp Suite, Mimikatz, Bloodhound, and others.
*
Threat Hunting
- Ability to learn fast new advanced persistent threat (APT) tactics, techniques, and procedures (TTPs) mapped to the cyber kill chain and apply them to incident response analysis.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin nibh augue, suscipit a, scelerisque sed, lacinia in, mi. Cras vel lorem. Etiam pellentesque aliquet tellus. Phasellus pharetra nulla ac diam. Quisque semper justo at risus. Donec venenatis, turpis vel hendrerit interdum, dui ligula ultricies purus, sed posuere libero dui id orci. Nam congue, pede vitae dapibus aliquet, elit magna vulputate arcu, vel tempus metus leo non est.
Etiam sit amet lectus quis est congue mollis. Phasellus congue lacus eget neque. Phasellus ornare, ante vitae consectetuer consequat, purus sapien ultricies dolor, et mollis pede metus eget nisi. Praesent sodales velit quis quam. Curabitur vel justo id mauris egestas congue. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris ut elit. Integer ac mi. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.
Sed id ligula quis est convallis tempor. Curabitur lacinia pulvinar nibh. Nam a sapien. Quisque placerat. Ut venenatis, miky nisl sit amet porta feugiat, ante magna molestie nisl, id fringilla neque ante at elit. Mauris ut elit. Integer ac mi. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Sed id ligula quis est convallis tempor. Curabitur lacinia pulvinar nibh. Nam a sapien. Quisque placerat. Ut venenatis, nisl sit amet porta feugiat, ante magna molestie nisl, id fringilla neque ante at elit.
Fusce ornare, ante vitae consectetuer consequat, purus sapien ultricies dolor, et mollis pede metus eget nisi. Praesent sodales velit quis quam. Curabitur vel justo id mauris egestas congue. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris ut elit. Integer ac mi. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Sed id ligula quis est convallis tempor. Curabitur lacinia pulvinar nibh. Nam a sapien.