
¡Activa las notificaciones laborales por email!
Genera un currículum adaptado en cuestión de minutos
Consigue la entrevista y gana más. Más información
A leading cybersecurity firm is seeking a Senior SOC Analyst in Madrid. This role involves defending digital assets through advanced incident investigations and threat hunting. Candidates should have 5–7 years of experience in SOC operations, strong knowledge of SIEM and EDR platforms, and scripting skills in Python or PowerShell. Join a dynamic team committed to cybersecurity excellence and professional growth.
Senior SOC Analyst - Barcelona
Since 2011, SQUAD Group has been a key player in the cybersecurity landscape. We partner with leading organizations to protect their information systems through a comprehensive 360° offering of consulting, integration, expertise, and managed services.
We believe in a collaborative approach to cybersecurity, where experts and clients work hand-in-hand to anticipate threats and protect critical infrastructure.
As part of our growing team, we're seeking a
Senior SOC Analyst
You are a hands‑on defender and investigator. A Senior Analyst focused on threat hunting, detection engineering, and incident response. Working across the SOC’s advanced security stack (SIEM, EDR, DLP, and NIDS) you’ll build, tune, and operate detection mechanisms that stop threats before they escalate.
Responsible for advanced incident investigations, threat hunts, and forensic analysis.
Develop and refine custom detection rules, correlation logic, and alert tuning.
Integrate and enhance data sources to improve signal fidelity.
Design and maintain automated playbooks using SOAR capabilities.
Collaborate with the Technical Lead on continuous detection improvement.
Mentor L1 / L2 analysts, sharing advanced investigative techniques.
5–7 years of experience in SOC operations, detection engineering, or incident response.
Strong technical knowledge of SIEM, EDR, and SOAR platforms (Elastic, CrowdStrike preferred).
Scripting or automation experience (Python, PowerShell) for enrichment or response tasks.
Understanding of MITRE ATT&CK, threat intelligence, and adversary emulation.
BTL2, GIAC GCIA / GCIH, CrowdStrike Certified Falcon Administrator, Elastic Security Analyst
We help you build a training and certification plan aligned with your professional goals through our SquadeXpérience.
Participate in internal events like our MixYourTalent webinars and monthly CTF sessions.
Attend major industry conferences and contribute to our #TheExpert technical blog.
Enjoy a dynamic and close‑knit environment with after‑work events and team gatherings that foster great camaraderie.