
Transport • B2C • B2B
SIXT is a global mobility company offering premium car rental, long-term rentals, car subscriptions, chauffeur services, and car-sharing through an integrated app and worldwide station network. With over 2,000 stations in 105+ countries and a diverse fleet of 222,000+ vehicles including luxury and specialty models, SIXT serves leisure and corporate customers with airport and city pick-up/return, business fleet solutions, and digital booking and loyalty features.
5001 - 10000 employees
Founded 1912
🚗 Transport
👥 B2C
🤝 B2B
2 days ago

Transport • B2C • B2B
SIXT is a global mobility company offering premium car rental, long-term rentals, car subscriptions, chauffeur services, and car-sharing through an integrated app and worldwide station network. With over 2,000 stations in 105+ countries and a diverse fleet of 222,000+ vehicles including luxury and specialty models, SIXT serves leisure and corporate customers with airport and city pick-up/return, business fleet solutions, and digital booking and loyalty features.
5001 - 10000 employees
Founded 1912
🚗 Transport
👥 B2C
🤝 B2B
• Designing and deploying detection mechanisms in on-premises and cloud systems to proactively detect and respond to security vulnerabilities and potential threats • Spearheading threat hunting initiatives to actively identify and mitigate risks, bolstering the organization's resilience against emerging cyber threats • Conducting thorough investigations into security incidents, uncovering root causes, and devising effective response strategies to contain and remediate breaches and intrusions • Collaborating with cross-functional teams to establish and enforce robust security policies and procedures that fortify critical systems and data against cyber attacks • Keeping abreast of cutting-edge technologies and staying informed on the latest cyber security trends to continuously enhance your skills and expertise in the ever-changing realm of information security.
• Several years of experience with SecOps • Experience with Incident response tools and methodologies • Used to leading complex initiatives to constantly improve our security posture, incident response and use cases • Proficient in AWS, SIEM, EDR, Phishing investigation • Knowledge on programming languages • Very good English skills • Skilled in conducting comprehensive security incident investigations to analyze data, perform forensic examinations, and identify root causes to mitigate security breaches and implement preventive measures.
• Generous Time Off • Enjoy 28 days of vacation, an additional day off for your birthday, and 1 volunteer day per year • Work-Life Balance & Flexibility • Benefit from a hybrid working model, flexible working hours, and no dress code • Great Employee Benefits • Access discounts on SIXT rent, share, ride, and SIXT+, along with partner discounts • Training & Development • Participate in training programs, external conferences, and internal dev & tech talks designed for your personal growth and development • Health & Well-being • Private health insurance to support your well-being • Additional Perks • Enjoy the Coverflex advantage system to enhance your employee experience
Apply NowNovember 18
Network Cybersecurity Engineer overseeing global infrastructure architecture, delivery, and operations. Focusing on firewalls, cloud connectivity, and security architecture across diverse environments.
November 13
Senior IT Network and Security Engineer at Nagarro designing, implementing, and maintaining network and security infrastructure with a focus on enterprise firewalls and DDI solutions.
November 12
Senior Manager handling Workday Security & Governance for HR at Otis. Leading security configurations and analysis while collaborating with cross-functional HR teams.
November 7
201 - 500
Cyber OT Security Lead overseeing cybersecurity and automation programs for a pharmaceutical company. Leading coordination across multiple sites in a remote capacity from Portugal.
🗣️🇪🇸 Spanish Required
October 24
Security Engineer at OutSystems ensuring secure application development by conducting threat modeling and security assessments. Collaborating with teams and leveraging expertise in AWS and Kubernetes for security tooling.