Cybersecurity Expert; SOC & Cloud
Publicado en 2026-01-12
-
TI/Tecnología
Seguridad cibernética, Seguridad de información
ABOUT US
At Leadtech, we’ve been redefining digital businesses since 2009, creating innovative online solutions that reach millions of users every month. With a diverse team of over 700 members from 23+ nationalities, we’re united by a passion for creativity and collaboration.
We specialize in delivering user‑centric experiences across web and mobile platforms, where people can connect with our products like never before.
We’re proud of our global reach and committed to fostering an inclusive workplace where every individual contributes to our shared vision of bringing cutting‑edge projects to life. Learn more about our journey and mission on ourpage!
ABOUTTHE ROLE
The Security team is excited to welcome a motivated Cybersecurity Expert to help us protect an organization’s digital assets, systems, and data from security threats.
As Cybersecurity Expert, you’ll play a vital role in operating and optimizing our Security Operations Center. You’ll have the opportunity to make a meaningful impact on both our products and processes.
If you’re passionate about solving complex problems, collaborating across departments, and driving results, this role is perfect for you!
YOUR MISSIONAs a Cybersecurity Expert (SOC & Cloud) at Leadtech, you will:
Operate & optimize (and potentially Lead) a Security Operations Center (SOC), which includes tasks such as:
- Advanced Incident Investigation and Analysis
- Handling Complex Threats:
Investigating high‑priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware. - Deep‑Dive Analysis:
Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data. - Cross‑Source Correlation:
Stitching together fragmented data from SIEM, EDR, and NDR tools to build a comprehensive picture of the attack.
- Handling Complex Threats:
- Proactive Threat Hunting and Detection Engineering
- Threat Hunting:
Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts. - Rule Creation & Tuning:
Developing custom detection logic and SIEM correlation rules to identify new malicious behavior. - Reducing False Positives:
Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents.
- Threat Hunting:
- Incident Response and Containment
- Orchestrating Response:
Acting as Security Incident Response Team (CSIRT) to isolate compromised assets and mitigate damage. - Developing Playbooks:
Creating and updating security playbooks and automated workflows within SOAR platforms to standardize incident response. - Forensic Evidence Preservation:
Ensuring digital evidence is collected and preserved according to legal and chain‑of‑custody standards.
- Orchestrating Response:
- Mentorship and Leadership
- Guidance for other members of the team:
In the future, mentoring and training Tier 1 and Tier 2 analysts on complex investigations and new technologies. - Quality Assurance:
Performing ticket reviews and providing feedback to ensure high‑quality documentation and adherence to Service Level Agreements (SLAs).
- Guidance for other members of the team:
- Strategy, Compliance, and Reporting
- Vulnerability Assessment:
Analyzing vulnerability scan results to identify critical weaknesses and recommending remediation plans. - Reporting and Compliance:
Generating reports on incidents, trends, and SOC performance for management, and auditing systems for compliance (e.g., ISO 27K1, PCI DSS, HIPAA). - Threat Intelligence Integration:
Incorporating external threat intel feeds to anticipate emerging threats and update defenses.
- Vulnerability Assessment:
We’re looking for a highly technical, hands‑on cybersecurity professional who thrives in a dynamic, cloud‑first environment. Ideally, you bring:
Must‑have experience:- Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
- Knowledge of Security frameworks such as ISO 27001, NIST, PCI‑DSS, OWASP, GDPR
- Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
- Deep Knowledge of cybersecurity/technical concepts such as:
- GNU/Linux systems
- Microsoft Sentinel and Defender, as well…
Para buscar, ver y solicitar empleos que acepten solicitudes de su ubicación o país, toque aquí para realizar una búsqueda: