SOC Analyst
itsme (Belgian Mobile ID)
Posted: January 3, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Job Description
itsme® has fundamentally changed how people lead their digital lives in Belgium, but we are not stopping there! Do you want to be a driving force to help expand on this success story as part of a talented team that is making a positive impact on society? Then keep on reading, you’ll probably like what you’ll see. We are itsme®, one of Europe’s fastest-growing scale-ups, counting 85 team members and growing. Our mission: providing a state-of-the-art digital identity solution to all people, enabling them to interact securely in the digital space. Now, only seven years after being founded, 7 million citizens use the itsme® app to identify themselves and sign documents online. Starting in Belgium, we successfully launched the itsme® app in 17 European countries, with the ambition to become an internationally leading player. itsme®, faces continuous threats from malicious actors seeking unauthorized access to sensitive information. The company's commitment to security is not only a regulatory necessity but also an integral part of delivering a reliable and secure digital identity solution to their users, due to the sensitive nature of a significant portion of their data and services. The SOC Analyst plays a pivotal role in proactively identifying and mitigating these threats through continuous monitoring, incident response, informing stakeholders and intelligence sharing. The SOC Analyst will actively handle emerging threats, minimize security attacks, prevent leaks and develop robust strategies to counter emerging cyber threats. The imperative is to insource Security Operations for the critical parts of the solution to reduce reliance on external partners to enhance security and safety, making growth crucial in achieving these objectives. What your job looks like The primary focus of the SOC Analyst includes four key priorities: Blue Teaming – Triage Queue : The analyst will actively engage in blue teaming activities, particularly in managing and prioritizing the triage queue. This involves the assessment and categorization of security incidents for effective response. Threat Hunting: Conducting proactive threat-hunting activities to identify potential security threats and vulnerabilities before they manifest into incidents. This involves exploring systems and networks to detect hidden threats. Detection and Monitoring of Current Systems: The SOC Analyst will play a crucial role in the ongoing detection and monitoring of existing systems. This includes continuous surveillance to identify and respond to any suspicious or malicious activities in real-time and define new use cases for monitoring and detection. Threat Intelligence Processing: The analyst will leverage threat intelligence to enrich investigations, enhance detections, and proactively defend against emerging threats. This involves analyzing threat intel feeds, integrating IOCs into monitoring systems, correlating intel with internal telemetry, and contributing to the creation of actionable insights for the broader security team.