Core Responsibilities

The main objective is to monitor, analyze, and manage high-criticality cybersecurity alerts, investigating incidents, escalating relevant events, and proposing continuous improvements to detection controls, rules, and processes to strengthen the organization's security posture. Key functions include investigating SOC-reported security alerts, real-time event monitoring using SIEM/XDR/EDR tools, classifying alerts, escalating critical events, and managing quarantined emails and malicious file blocking.

Requirements

Candidates should possess at least three years of experience in cybersecurity or security monitoring, coupled with technical knowledge of networks, routing, and switching. Essential technical skills include proficiency with Windows, Linux, and Mac operating systems, understanding common exploits, network attacks, phishing, and malware, along with knowledge of programming, databases, and SIEM/IDS/IPS technologies.

Additional Information

Experience Level

2-5

Job Language

Spanish

Work Mode

Hybrid