¡Activa las notificaciones laborales por email!

(T628) Senior Security Engineer - Soc

Ackcent Cybersecurity

Barcelona

A distancia

EUR 50.000 - 70.000

Jornada completa

Ayer
Sé de los primeros/as/es en solicitar esta vacante

Descripción de la vacante

A cybersecurity firm located in Barcelona is seeking a SOC Team member to monitor security threats and handle incidents. The ideal candidate will have over 3 years of experience, a degree in Computer Engineering, and strong knowledge of network fundamentals and security monitoring tools. This senior role entails leading incident responses, training junior members, and conducting forensic analysis.

Servicios

Competitive salary
Medical insurance
Remote work
Birthday off
Flexible hours
Innovative and collaborative work environment

Formación

  • Over 3 years of relevant experience in information security.
  • Experience working in a SOC environment.
  • Fluent in English, both written and spoken.

Responsabilidades

  • Analyze and verify security threat monitoring alerts to prioritize incidents.
  • Lead responses to security incidents and investigations.
  • Conduct forensics and malware analysis.

Conocimientos

Security monitoring tools
Network fundamentals
Incident response
Scripting in Python
Self-motivated

Educación

Degree in Computer / Telecommunications Engineering

Herramientas

Firewalls
IDS / IPS systems
SIEM

Descripción del empleo

Professionals at Ackcent Cybersecurity share a common goal : to enhance our customers' security, protect their assets from cyber threats, and deliver high-quality service through effective communication and customer care.

In this position, you will be part of our SOC Team responsible for security threat monitoring and incident handling. You will help secure and defend our clients' assets. We seek professionals with cybersecurity experience and a comprehensive understanding of Networks, Security Architecture, and Security Monitoring Tools.

As a key team member, you will lead handling security threats and incidents, improve and maintain tools and procedures, and conduct forensics and malware analysis for mitigation and threat containment. This senior role includes training and supporting junior team members and collaborating with other departments on security initiatives and decisions.

Key Responsibilities

  • Analyze and verify security threat monitoring alerts to identify, classify, and prioritize incidents.
  • Create, improve, and maintain security monitoring alerts based on data correlation.
  • Operate and maintain IDS / IPS systems, working closely with security and network architects.
  • Lead responses to security incidents and investigations, coordinating with customers and IT providers, adhering to SLAs.
  • Conduct forensics and malware analysis to identify indicators of compromise, assess incident scope and impact.
  • Report findings to the SOC Manager and the involved CISO / CIO.
  • Train and advise junior team members.
  • Perform proactive research on the latest security threats and vulnerabilities to keep tools and processes current.
  • Ensure contractual obligations and SLAs are met or exceeded.
  • Manage priorities, deadlines, and deliverables.
  • Develop and improve SOC tools and operational procedures.

Required Skills & Experience

  • Degree in Computer / Telecommunications Engineering or related field.
  • Over 3 years of relevant experience in information security.
  • Experience working in a SOC environment.
  • Strong understanding of network fundamentals and internet protocols.
  • Knowledge of system administration and security architecture.
  • Experience with security monitoring tools (firewalls, IDS / IPS, HIDS, WAF, SIEM).
  • Experience with at least one IDS technology.
  • Scripting skills in Bash, Python, or PowerShell.
  • Fluent in English, both written and spoken.
  • Self-motivated with the ability to work independently and in teams in challenging environments.
  • Nice to Have

  • Proficiency with Windows, Unix / Linux, and OSX operating systems.
  • Knowledge of Windows server administration.
  • Understanding of the cybersecurity landscape, including kill chain, TTPs, Threat Intelligence, malware distribution.
  • Knowledge of security concepts like defense in depth, BYOD, data loss prevention, risk assessment, and security metrics.
  • Over three years of SOC experience.
  • Strong analytical, problem-solving, communication, and leadership skills.
  • Experience with AWS or Azure infrastructure.
  • Previous malware reverse engineering experience.
  • Relevant certifications (GCIH, GCFA, GCFE, GREM, CISSP) are advantageous.
  • What We Offer

  • Competitive salary
  • Medical insurance
  • Remote work
  • Birthday off
  • Flexible hours
  • Innovative and collaborative work environment
  • J-18808-Ljbffr

    Consigue la evaluación confidencial y gratuita de tu currículum.
    o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.