Técnico / a de Selección de Personal

Sé de los primeros solicitantes.
ceesur INTEGRACIÓN
Aldaya
A distancia
EUR 50.000 - 90.000
Sé de los primeros solicitantes.
Ayer
Descripción del empleo

Crear una alerta de empleo para esta búsqueda

Intercambio de Incumplimiento • Benidorm

Director de Información

At One eSecurity, we are a market-leading specialist in Threat Detection and Digital Forensics & Incident Response (DFIR). Our commitment to excellence, innovation, and passion drives everything we do.

We’re looking for a top-tier, fully remote cybersecurity professional with 5+ years of experience in Threat Hunting and Cyber Threat Intelligence (CTI). If you have a sharp eye for advanced threats and hands-on expertise in incident response, join us and make an impact!

Main responsibilities

  1. Use threat intelligence and behavioral analysis to find potential anomalies and suspicious activities that automated security systems might miss.
  2. Actively search for hidden threats and indicators of compromise (IOCs) across the network, endpoints, and systems, using both known and unknown attack techniques.
  3. Operation of Threat Hunting tools such as EDRs, XDRs, SIEMs, etc., including the creation and execution of hunts as well as analysis of results.
  4. Conduct in-depth analysis of unusual patterns, system behaviors, and network traffic to uncover advanced threats, including zero-day attacks, APTs, insider threats, and advanced malware.
  5. Develop and refine detection rules and use cases for security monitoring systems (e.g., SIEM, IDS / IPS, EDR solutions) based on evolving attack techniques.
  6. Generate reports for the Clients, detailing discovered threats, the severity of risks, and recommended actions for remediation.
  7. Identify trends, tactics, techniques, and procedures (TTPs) used by cyber adversaries.
  8. Perform deep analysis of indicators of compromise (IOCs) and attack signatures.
  9. Gather and aggregate information from various sources, such as open-source intelligence (OSINT), dark web monitoring, threat feeds, and other threat-sharing platforms.
  10. Work closely and provide actionable threat intelligence to support Incident Response team during active cyber incidents and Threat Hunting team during active threat detection.
  11. Client management.
  12. Project management.

Requirements :

  1. University degree is desirable but not required.
  2. 8+ years professional experience in Threat Hunting, EDR technology, SOC, Blue team, incident response, etc.
  3. Have a solid understanding of the information security threat landscape.
  4. Knowledge of the threats most commonly used by attackers.
  5. Knowledge of analysis platforms and query languages.
  6. Knowledge of the most commonly used SIEM technologies on the market.

Knowledge / experience :

  1. Understanding of TCP / IP networks, base protocols for the development and analysis of IDS / PCAPs rules, analysis of logs, and DNS / HTTP packets as well as browsing logs.
  2. Incident response.
  3. Security frameworks such as MITRE, ENISA, CCN, etc.
  4. CTI tools : Virus Total, Open CTI, Maltego, etc.
  5. Forensic analysis tools such as Volatility or Regripper.
  6. Management of services and / or projects.
  7. Customer focus. Skills to lead meetings, project presentations, etc.
  8. A plus : experience in team management.

Ability to work in a team.

Demonstrate innovative and creative thinking as well as problem-solving skills.

Languages : Fluent in English and Spanish.

Obtenga la revisión gratuita y confidencial de su currículum.
Selecciona un archivo o arrástralo y suéltalo
Avatar
Asesoramiento online gratuito
¡Mejora tus posibilidades de entrevistarte para ese puesto!
Adelántate y explora vacantes nuevas de Técnico / a de Selección de Personal en