IT Security engineer

Back to all jobs
  • Nebius
  • Amsterdam, NH
  • 2 months ago
Published
February 8, 2026
Location
Amsterdam, Israel
Job Type

Job Description

<div class="content-intro"><p><strong data-stringify-type="bold">Why work at Nebius<br></strong>Nebius is leading a new era in cloud computing to serve the global AI economy. We create the tools and resources our customers need to solve real-world challenges and transform industries, without massive infrastructure costs or the need to build large in-house AI/ML teams. Our employees work at the cutting edge of AI cloud infrastructure alongside some of the most experienced and innovative leaders and engineers in the field.</p>
<p><strong>Where we work<br></strong>Headquartered in Amsterdam and listed on Nasdaq, Nebius has a global footprint with R&amp;D hubs across Europe, North America, and Israel. The team of over 800 employees includes more than 400 highly skilled engineers with deep expertise across hardware and software engineering, as well as an in-house AI R&amp;D team.</p></div><p><strong>Position Overview:</strong></p>
<p>The IT Security Engineer will be responsible for implementing, managing, integrating and maintaining security systems across the organization’s IT landscape. The role includestranslating policies and standards into procedures and controls, collaborating with internal stakeholders such as IT, Product Security, and Data Centers, and performing preventive actions and rapid response to security incidents.</p>
<p><strong>Key Responsibilities:</strong></p>
<p>Security Systems:</p>
<p>Implement security architectures and controls.Maintain and manage security systems such as:XDR (Extended Detection &amp; Response), SWG (Secure Web Gateway), DLP (Data Leakage Prevention), Email Security, Network security (Firewalls, NAC), IAM (Identity &amp; Access Management), CASB (Cloud Access Security Broker), PAM (Privileged Access Management), EPM (Endpoint Privilege Management), BAS (Breach &amp; Attack Simulation), Vulnerability Scanners, Training &amp; Awareness, SIEM (Security Information &amp; Event Management), SOAR (Security Orchestration, Automation &amp; Response), Password Manager, Threat Intelligence, Patch Management, TPRM (Third-Party Risk Management), EASM (External Attack Surface Management).</p>
<p>Collaborate with teams:</p>
<p>Develop and implement security for IT systems, applications, and networks.Integrate security into the design and development of new and existing systems.Provide guidance on secure configurations and designs.Identify and remediate vulnerabilities and misconfigurations.Monitor and optimize system and processes to enhance security and comply with policies and standards.Lead and execute cross-organizational security projects and initiatives.</p>
<p>Technological&nbsp;Documentation:</p>
<p>Write technical documents such as:HLD (High Level Design), LLD (Low Level Design), system documentation, procedures, guidelines, IMF (Incident Management Flow), network diagrams.Incident Response and Recovery:Collaborate with the Security Operations Center (SOC) and MSSP to ensure robust incident detection and response capabilities.Contribute to the development of incident response plans and recovery strategies.Participate in post-incident reviews to identify lessons learned and implement improvements.</p>
<p>Security&nbsp;Technology&nbsp;Evaluation:</p>
<p>Research&nbsp;and&nbsp;recommend&nbsp;new&nbsp;security&nbsp;technologies&nbsp;to&nbsp;enhance&nbsp;the&nbsp;organization's&nbsp;security&nbsp;posture.Oversee&nbsp;the&nbsp;implementation&nbsp;and&nbsp;integration&nbsp;of&nbsp;security&nbsp;tools&nbsp;and&nbsp;solutions.Evaluate&nbsp;the&nbsp;impact&nbsp;and&nbsp;effectiveness&nbsp;of&nbsp;security&nbsp;technologies&nbsp;in&nbsp;mitigating&nbsp;risks.Compliance&nbsp;and&nbsp;Audit&nbsp;Support:Ensure&nbsp;IT&nbsp;systems&nbsp;and&nbsp;processes&nbsp;comply&nbsp;with&nbsp;relevant&nbsp;regulatory&nbsp;standards&nbsp;(e.g.,&nbsp;ISO&nbsp;27001,&nbsp;NIST,&nbsp;GDPR).Support&nbsp;internal&nbsp;and&nbsp;external&nbsp;audits&nbsp;by&nbsp;providing&nbsp;documentation&nbsp;and&nbsp;evidence&nbsp;of&nbsp;compliance.Maintain&nbsp;detailed&nbsp;records&nbsp;of&nbsp;security&nbsp;controls&nbsp;and&nbsp;activities&nbsp;for&nbsp;audit&nbsp;purposes.</p>
<p>&nbsp;</p>
<p><strong>Qualifications:</strong></p>
<p>Education&nbsp;and&nbsp;Certifications:Bachelor’s&nbsp;degree&nbsp;in&nbsp;Computer&nbsp;Science,&nbsp;Information&nbsp;Security,&nbsp;or&nbsp;a&nbsp;related&nbsp;field.Relevant&nbsp;certifications&nbsp;such&nbsp;as&nbsp;CISSP,&nbsp;CISM,&nbsp;CCSP,&nbsp;or&nbsp;similar&nbsp;are&nbsp;highly&nbsp;desirable.</p>
<p>Experience:Minimum&nbsp;of&nbsp;5&nbsp;years&nbsp;of&nbsp;experience&nbsp;in&nbsp;IT&nbsp;security&nbsp;(System,&nbsp;Network,&nbsp;Information,&nbsp;Cyber),&nbsp;with&nbsp;at&nbsp;least&nbsp;3&nbsp;years&nbsp;in&nbsp;a&nbsp;security&nbsp;engineering&nbsp;role.</p>
<p>Familiarity&nbsp;with&nbsp;securing&nbsp;cloud-based&nbsp;environments&nbsp;and&nbsp;SaaS&nbsp;platforms.</p>
<p>Skills and Knowledge:Fluent&nbsp;in&nbsp;English.</p>
<p>Expertise&nbsp;in&nbsp;security&nbsp;engineering&nbsp;principles,&nbsp;relevant&nbsp;frameworks,&nbsp;and&nbsp;best&nbsp;practices.Strong&nbsp;understanding&nbsp;and&nbsp;hands-on&nbsp;experience&nbsp;with&nbsp;Security&nbsp;&amp;&nbsp;IT&nbsp;technologies.Excellent&nbsp;interpersonal&nbsp;and&nbsp;communication&nbsp;skills&nbsp;for&nbsp;cross-functional&nbsp;collaboration.</p><div class="content-conclusion"><p><strong>What we offer</strong>&nbsp;</p>
<ul>
<li>Competitive salary and comprehensive benefits package.</li>
<li>Opportunities for professional growth within Nebius.</li>
<li>Flexible working arrangements.</li>
<li>A dynamic and collaborative work environment that values initiative and innovation.</li>
</ul>
<p><span data-contrast="auto">We’re growing and expanding our products every day. If you’re up to the challenge and are excited about AI and ML as much as we are, join us!</span></p></div>

Key Skills
? Key Skills in dark blue have been inferred based on similar industry roles
Incident Response ML R CISSP CISM Security Operations Network Security SIEM IAM Threat Intelligence Risk Management

Subscribe to Career Resources

Get the latest career advice, industry insights, and job opportunities delivered to your inbox.