Job Search and Career Advice Platform

¡Activa las notificaciones laborales por email!

Security Expert - Threat Hunter

Bebeecybersecurity

Xico

Presencial

MXN 200,000 - 400,000

Jornada completa

Hoy
Sé de los primeros/as/es en solicitar esta vacante

Genera un currículum adaptado en cuestión de minutos

Consigue la entrevista y gana más. Más información

Descripción de la vacante

A cybersecurity firm in Veracruz is seeking an experienced professional to manage security monitoring and incident response activities. In this role, you will utilize automation tools to enhance operations and develop playbooks to identify and mitigate vulnerabilities. The organization promotes a collaborative culture and offers training in cybersecurity practices. Strong communication skills and a thorough understanding of cyber threats are essential for success in this position.

Responsabilidades

  • Manage and perform day-to-day security monitoring and incident response activities.
  • Lead efforts to maintain effective relationships with internal technology groups.
  • Implement automation and orchestration to improve security monitoring efficiency.
  • Develop automated playbooks for vulnerability identification and remediation.
Descripción del empleo
About Cybersecurity Incidents

About Cybersecurity IncidentsWe are a team of experts dedicated to protecting our clients from cyber threats.A Service Delivery Center with offices in multiple locations.

We deliver high-value technology, consulting, and corporate support services to our clients.Our Employer Value Proposition is clear : Grow.Grow isn't just a word — it's how we lead, and thrive.

Our Culture

It's the mindset that drives our culture and shapes every opportunity :

  • Cultivate a collaborative, inclusive, and multicultural workplace where you belong.
  • Evolve by creating impact and leaving your mark on global projects.
  • Develop your potential with real career paths, learning programs, and mentorship.
  • Blossom your individuality — come as you are, and thrive as your authentic self. And because we know that thriving at work also means thriving in life, we back this mindset with our total rewards program, designed to support your well-being, goals, and personal milestones.
Responsibilities
  • Manage and perform day-to-day security monitoring and incident response activities for 24x7 operations, using a thorough understanding of cybersecurity.
  • Response activities may include incident response, incident management, driving remediation or threat mitigation, threat hunting, and forensic analysis.
  • Serve as a service owner and subject matter expert for automation tools to enhance delivery and integration.
  • Lead efforts to build and maintain effective relationships with multiple internal technology groups, ensuring strategic alignment across teams.
  • Serve as a key subject matter expert for automation tools, guiding others to achieve organizational goals and objectives.
  • Leverage intelligence to lead and manage threat and vulnerability monitoring, respond appropriately, and develop risk mitigation strategies.
  • Implement automation and orchestration to improve efficiency and effectiveness of security monitoring and response processes.
  • Integrate processes and technologies, with the objective of a

Use automation tools to enhance workflows, automate processes, and improve efficiency.

Identify opportunities for improvement and optimize security operations.

Utilize automation tools to streamline and automate these processes, enhancing security operations' effectiveness.

Develop automated playbooks for vulnerability identification and remediation to ensure comprehensive security monitoring coverage.

Stay current on information security controls, practices, techniques, and capabilities, focusing on automation advancements.

Facilitate skill development for security personnel on monitoring and incident response by mentoring and conducting sessions on using automation tools for efficiency.

Promote collaboration and standardization among these federated technology groups, focusing on shared interests and priorities.

Continuously incorporate learnings into preventive and detective controls.

Define security configurations for monitoring tools—alerts, correlation rules, and reporting—using vendor products, services, open-source, and custom utilities.

Document processes and procedures in the form of playbooks and reference guides.

Consigue la evaluación confidencial y gratuita de tu currículum.
o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.