Job Title Associate Information Security Analyst (m/f/d) Our IT SOC (Security Operations Center) Team is looking for a new colleague to support the Computer Security Incident Response Team (CSIRT) and participate in the investigations of cyber security threats targeting travel industry. We are looking for an Associate Information Security Analystwho is eager to actively minimize and control the damage resulting from security incidents, provide effective guidance for response and recovery activities, and work closely with the CERT team to prevent future incidents from happening. The successful candidate will be bright, motivated, detailed orientated and willing to go the extra mile to ensure exceptional results for our customers. This is a great opportunity in security operations at a growing company with advancement chances for the right candidate. The future is there to be explored. Come join the Amadeus family! In this role you’ll Monitor and analyze security events and alerts from various sources, such as network and endpoint sensors, SIEM systems, and other commercial sources according to the SOC CSIRT processes. Investigate security incidents and escalate them to the appropriate team for resolution. Execute initial response actions to contain and mitigate threats based on predefined playbooks and procedures. Document and follow up on potential security risks detected. Execute management support personnel escalations. Collaborate with other members of the security organization to develop and implement measures to protect the organization's IT infrastructure. Provide clear and concise communication to SOC team members and, when required, to stakeholders across the organization. Stay up to date with the latest security threats and vulnerabilities. About the ideal candidate University degree in Cyber Security, Computer Science, Information Technology or related disciplines 1 2 years of related experience in SOC/NOC organizations. Industry certification as GCIH, GCIA, CCNA, CEH or comparable a plus Good understanding of cybersecurity principles, practices, and attack techniques. Experience working with technology solutions, such as Splunk, Sentinel, Azure, AWS, GCP, SOAR, XDR or similar. Excellent interpersonal skills, self motivation, and the ability to work in a matrix environment and think outside the box. Self disciplined, self motivated and the ability to organize and prioritize time effectively. A drive to learn and bring in new ideas, test and implement them. Ability to work in a fast paced environment and manage stress effectively. Ability to establish and maintain effective relationships with all levels of personnel both internally and externally. High level of integrity and discretion in handling confidential information. Fluent in English with strong written and oral communication skills to achieve results in a multicultural environment. Work Conditions Must be willing to work on a shifting schedule within standard busi