• no jobs available

Cyber Security

Think like a hacker

Together we want to understand the mindset of attackers and stop them before they do any damage. Are you creative and do you enjoy thwarting attackers with the latest technology? Then join us!

As a global specialty chemicals company, we are a popular target for hackers and corporate spies. We're standing up to them: According to BitSight, we rank among the top in cyber security in the comparative chemicals sector. But the faster IT develops, the more sophisticated the methods used by cybercriminals become. That's why we offer comprehensive training opportunities in a flexible working environment. In the digital world, your opponents are often unknown and yet it is critical that you always remain one step ahead of them. You must think like an attacker in order to help prevent them from inflicting any harm. This works for us because we are a well-trained and diverse team in which everyone takes full responsibility for their tasks and has complete trust in their colleagues. Hierarchies are not as important to us as the protection of our data and networks. We are looking for cyber security experts to join us in successfully fending off intruders in our network. This is critical because there is no standard procedure for this - every attack is different and thus requires a customized approach.

We at Evonik

Arijo, Chief Information Security Officer
Arijo, Chief Information Security Officer

"There is a digital pandemic every day in the information technology environment. As many as 380,000 malware variants are added every day to exploit vulnerabilities. And as far as these vulnerabilities are concerned, there may not yet be a vaccine to protect IT systems. Information technology, and therefore cybercrime, are evolving rapidly. One buzzword, for example, is Industry 4.0 - and this is associated with the ongoing digitalization of production. This is resulting in entirely new hacking scenarios that clearly go beyond conventional IT. We are countering this with sophisticated cyber security programs that continuously raise the level of our cyber security. Because cyber security is not a state, but a process. "

Christian, Director Cyber Security Operation Center
Christian, Director Cyber Security Operation Center

"There are several million cyberattacks worldwide every day. No one knows the exact quantity, because people don't always even notice. Evonik is also exposed to attacks. But protection against such attacks is no longer possible just using firewalls and antivirus programs. You can only be successful if you know the attackers' TTPs (tactics, techniques and procedures), so that you can react accordingly. We work hard to acquire the necessary information. And of course, we also share information with other companies, because you only stand a chance against professional hackers if you work together."

Christian heads up Evonik's Cyber Security Operation Center, which tracks intruders in the digital world. 

Manuel, Director Cyber Security
Manuel, Director Cyber Security

"A company's IT supports its business. It must therefore be functional and user-friendly - but also secure. Is it enough just to log into the computer in the morning with your password? Or shouldn't fingerprint sensors, iris scans and voice verification always be added to the mix? As is so often the case, the truth lies in the middle. That's why we take a risk-based approach. As hackers often select targets with extensive access rights, such as administrators or research staff, we provide them with particularly effective protection using all available options.

This procedure is in line with our general approach: we monitor the threat posed by cyberattacks very closely, continuously analyze the risk to us and react quickly by adapting our security measures. "

Mister X, Hacker
Mister X, Hacker

To understand the methods and procedures employed by real hackers, we make our networks undergo an endurance test: We try to break into our networks ourselves, crack passwords with real attack tools, and find vulnerabilities. We then incorporate this experience into our work.