The European Cybersecurity Competence Centre (ECCC), the European Union's main body for pooling investment in cybersecurity, has issued a public call for expressions of interest for independent experts. Announced on May 18, 2026, the initiative aims to build a robust database of qualified professionals to assist in the evaluation and oversight of projects funded by the EU's flagship programs, Digital Europe and Horizon Europe. This move is part of the EU's broader strategy to bolster its digital sovereignty and resilience by strategically investing billions of Euros into cybersecurity research, innovation, and infrastructure deployment. The ECCC is seeking individuals with diverse expertise across the cybersecurity spectrum to ensure that EU funds are allocated effectively and that funded projects deliver on their objectives.
The call for experts is a critical operational component of the ECCC's mandate to manage and direct the EU's cybersecurity funding. The selected experts will perform two primary functions:
The call is continuous and will remain open for the duration of the EU's 2021-2027 Multi-annual Financial Framework. However, the ECCC has set a deadline of June 15, 2026, for applicants who wish to be considered for the imminent evaluation cycles.
This initiative directly involves the European Cybersecurity Competence Centre (ECCC) and the broader European Commission apparatus responsible for the Digital Europe and Horizon Europe programs. The experts will be drawn from a wide range of organizations across the EU, including:
To be considered, applicants must register on the EU's official Funding & Tenders Opportunities Portal and declare their expertise. The key requirements for applicants are:
Expertise is sought in a broad range of fields, including but not limited to:
This initiative is a key step in professionalizing the EU's cybersecurity funding process. By creating a large, diverse pool of external experts, the ECCC aims to:
This effort is aligned with other major EU legislative acts, such as the EU Cyber Solidarity Act, which mandates the creation of a European Cybersecurity Alert System. The experts selected through this call will play a direct role in building the technological and human capabilities needed to realize these strategic goals.
Deadline for experts to register to be considered for upcoming evaluations.
The ECCC announces the call for independent experts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.