×
Regístrese Aquí para solicitar empleo o publicarlo X

Cybersecurity Expert; SOC & Cloud

Trabajo disponible en: 08001, Barcelona, Cataluna, España
Empresa: leadtech
Tiempo completo posición
Publicado en 2026-01-12
Especializaciones laborales:
  • TI/Tecnología
    Seguridad cibernética, Seguridad de información
Rango Salarial o Referencia de la Industria: 50000 - 70000 EUR Anual EUR 50000.00 70000.00 YEAR
Descripción del trabajo
Puesto: Cybersecurity Expert (SOC & Cloud)

ABOUT US

At Leadtech, we’ve been redefining digital businesses since 2009, creating innovative online solutions that reach millions of users every month. With a diverse team of over 700 members from 23+ nationalities, we’re united by a passion for creativity and collaboration.

We specialize in delivering user‑centric experiences across web and mobile platforms, where people can connect with our products like never before.

We’re proud of our global reach and committed to fostering an inclusive workplace where every individual contributes to our shared vision of bringing cutting‑edge projects to life. Learn more about our journey and mission on ourpage!

ABOUT

THE ROLE

The Security team is excited to welcome a motivated Cybersecurity Expert to help us protect an organization’s digital assets, systems, and data from security threats.

As Cybersecurity Expert, you’ll play a vital role in operating and optimizing our Security Operations Center. You’ll have the opportunity to make a meaningful impact on both our products and processes.

If you’re passionate about solving complex problems, collaborating across departments, and driving results, this role is perfect for you!

YOUR MISSION

As a Cybersecurity Expert (SOC & Cloud) at Leadtech, you will:

Operate & optimize (and potentially Lead) a Security Operations Center (SOC), which includes tasks such as:

  • Advanced Incident Investigation and Analysis
    • Handling Complex Threats:
      Investigating high‑priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware.
    • Deep‑Dive Analysis:
      Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data.
    • Cross‑Source Correlation:
      Stitching together fragmented data from SIEM, EDR, and NDR tools to build a comprehensive picture of the attack.
  • Proactive Threat Hunting and Detection Engineering
    • Threat Hunting:
      Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts.
    • Rule Creation & Tuning:
      Developing custom detection logic and SIEM correlation rules to identify new malicious behavior.
    • Reducing False Positives:
      Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents.
  • Incident Response and Containment
    • Orchestrating Response:
      Acting as Security Incident Response Team (CSIRT) to isolate compromised assets and mitigate damage.
    • Developing Playbooks:
      Creating and updating security playbooks and automated workflows within SOAR platforms to standardize incident response.
    • Forensic Evidence Preservation:
      Ensuring digital evidence is collected and preserved according to legal and chain‑of‑custody standards.
  • Mentorship and Leadership
    • Guidance for other members of the team:
      In the future, mentoring and training Tier 1 and Tier 2 analysts on complex investigations and new technologies.
    • Quality Assurance:
      Performing ticket reviews and providing feedback to ensure high‑quality documentation and adherence to Service Level Agreements (SLAs).
  • Strategy, Compliance, and Reporting
    • Vulnerability Assessment:
      Analyzing vulnerability scan results to identify critical weaknesses and recommending remediation plans.
    • Reporting and Compliance:
      Generating reports on incidents, trends, and SOC performance for management, and auditing systems for compliance (e.g., ISO 27K1, PCI DSS, HIPAA).
    • Threat Intelligence Integration:
      Incorporating external threat intel feeds to anticipate emerging threats and update defenses.
WHAT WILL MAKE YOU STAND OUT FROM THE CROWD

We’re looking for a highly technical, hands‑on cybersecurity professional who thrives in a dynamic, cloud‑first environment. Ideally, you bring:

Must‑have experience:
  • Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
  • Knowledge of Security frameworks such as ISO 27001, NIST, PCI‑DSS, OWASP, GDPR
  • Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
  • Deep Knowledge of cybersecurity/technical concepts such as:
    • GNU/Linux systems
    • Microsoft Sentinel and Defender, as well…
Tenga en cuenta que actualmente no se aceptan solicitudes desde su jurisdicción. Las preferencias de los candidatos son decisión del empleador o del agente reclutador.
Para buscar, ver y solicitar empleos que acepten solicitudes de su ubicación o país, toque aquí para realizar una búsqueda:
 
 
 
Busque más trabajos aquí:
(Ingrese pocas palabras para obtener mejores resultados)
Localización
Increase search radius (miles)

Idioma de la publicación
Categoría de empleo
Nivel educativo
Filtros
Nivel Educativo
Experiencia profesional mínima para el empleo (años)
Publicado en los últimos:
Salario