CrawlJobs Logo

Defensive Security Engineer (IR)

adevinta.com Logo

Adevinta

Location Icon

Location:
Spain , Barcelona

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

As the Defensive Security Engineer, you will be part of the company’s Incident Response (IR) team and collaborate with our Security Operations Centre (SOC) provider. This role is crucial in defending our digital assets, ensuring an effective response to security incidents, and proactively enhancing our defensive posture. This position requires autonomy and pro-activeness skills, and a deep understanding of defensive cybersecurity technologies. You will be instrumental in ensuring that Adevinta’s security strategy covers industry-relevant security standards. The Incident Response team is part of the Information Security department where your team will collaborate with other services such as Vulnerability Management, Bug Bounty programs, and SPLC Security among others.

Job Responsibility:

  • Contribute to the Incident Response (IR) team’s efforts by fostering a culture of proactive defence and continuous improvement through active participation in response processes and initiatives
  • Actively participate in the incident response lifecycle, including preparation, detection, analysis, containment, eradication, recovery and learning, ensuring timely and effective responses to potential threats
  • Support the development and refinement of incident response policies, playbooks, escalation procedures, and tabletop exercises
  • Contribute to post-mortem analyses to improve incident detection and response capabilities continuously
  • Work closely with other relevant teams and roles, such as the DPO, Privacy, Global Incident Teams, the rest of the InfoSec teams, and E&C
  • Assist in managing the external MSSP by ensuring alignment with organisational policies, standards, and expectations regarding service quality
  • Collaborate with the SOC team to monitor and assess the performance of security monitoring, triage, and alerting processes
  • Participate in the operations and enhance the control of defensive security technologies, including EDR, SIEM, DLP, NIDS, and threat intelligence solutions
  • Gather, analyse, and operationalise threat intelligence information to enhance detection, response, and prevention efforts
  • Collaborate to prepare periodic reports and collaborate with cross-functional teams to share valuable insights gained from alerts and incidents
  • Report to the Incident Response Manager
  • May be required to travel occasionally, mainly to the EU
  • Work in a hybrid remote/on-site environment
  • Possibility of being on-call

Requirements:

  • An experienced security analyst with the mentioned solutions and resolving security incidents in large enterprise environments
  • You are familiar with Incident Management At Google (IMAG)
  • Structured, analytical, autonomous and proactive persona
  • Familiar with the Agile methodology
  • Experience with security frameworks and methodologies such as MITRE ATT&CK, ENISA or NIST
  • You have a hacker and an open mindset
  • You have software development skills
  • You have a good understanding of AWS Cloud technologies, services, security capabilities, and controls such as SCPs, Security Groups, IAM, etc
  • You understand SDLC (coding and development) with modern tooling and ecosystems such as Kubernetes, Github, Github Action, infrastructure as code, etc
  • You have excellent knowledge of security for networks, protocols, systems and applications
  • You have strong analytical and problem-solving skills, with the ability to synthesise complex data into actionable insights
  • You are fluent in English (spoken and written)
  • You have excellent communication and interpersonal skills, with the ability to build relationships and influence others
  • You have demonstrated an ability to work in a multicultural environment

Nice to have:

  • Public or private presentations
  • Open source contributor
  • Participated in conferences and trainings
  • Certifications
  • Member of bug bounty programs, CTF player or member of ethical hacking communities, recognised in the Hall of Fame, CVE mentions or vulnerability reporter
What we offer:
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • A collaborative environment with an opportunity to explore your potential and grow
  • A range of locally relevant benefits

Additional Information:

Job Posted:
April 23, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Defensive Security Engineer (IR)

New

Cloud Defensive Security Engineer (Elastic)

As a Defensive Security Engineer, you will be part of the Cloud Defense team wit...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience designing, operating and troubleshooting Elastic deployments in production (on-prem or cloud-managed)
  • Experience building and operating log/telemetry pipelines into Elastic (Filebeat/Metricbeat/other Beats, Elastic Agent, Logstash, ingest pipelines)
  • Proficiency with Kibana: dashboards, visualisations, Lens, saved searches, alerting and spaces
  • Solid understanding of distributed systems basics relevant to Elastic (indexing, sharding, replication, cluster health)
  • Elastic Certified Engineer (or equivalent depth of experience), however certification is a plus
  • Experience with infrastructure-as-code (e.g. Terraform, Ansible, CloudFormation) to deploy and manage infrastructure
  • Experience with CI/CD pipelines (GitHub Actions, Jenkins, etc…) to automate configuration and infrastructure deployments
  • Hands-on experience with Linux systems, containers and Kubernetes (EKS or vanilla deployments)
  • Experience with public cloud environments, preferably AWS and/or GCP (cloud logging, IAM basics, network fundamentals)
  • Good understanding of core security and SOC concepts: logs vs events vs alerts, detections, triage and investigations
Job Responsibility
Job Responsibility
  • Redesign, evolve and operate our Elastic stack (Elasticsearch, Kibana, Elastic Security/Observability) as a core part of the Defensive platform
  • Own the ingestion pipelines for security and infrastructure telemetry (e.g. AWS/GCP audit logs, EDR telemetry, OS/syslog from Linux fleets and key application logs from our core products), including Beats/Agents, ingest pipelines and index lifecycle management
  • Pragmatically optimise Elastic for performance, scalability, cost and reliability (index strategy, shard planning, hot/warm/cold, retention policies)
  • Define and maintain standards and templates for indices, data streams, mappings and dashboards
  • Implement and maintain detection content in Elastic (KQL/EQL queries, rules, anomaly jobs) following defense-as-code practices: versioning, code reviews, testing and CI/CD
  • Collaborate with engineering teams, SOC and Incident Response to translate threat scenarios and cloud/runtime risks into Elastic rules, alerts and dashboards
  • Improve detections to reduce false positives and improve signal quality, based on feedback from SOC, IR and product teams
  • Contribute to internal tooling that improves detection engineering (e.g. shared rule templates, test harnesses, linters, rule packaging)
  • Manage Elastic infrastructure, data pipelines, and content deployments using IaC tools (Terraform, CloudFormation) and CI/CD platforms (GitHub Actions, Argo CD)
  • Integrate Elastic with other security and cloud services (e.g. EDR agents, cloud-native security tools, ticketing, notification channels, SOAR) to support end-to-end defensive workflows
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • Win together, lose together is one of our key behaviours
  • a collaborative environment with an opportunity to explore your potential and grow
  • a range of locally relevant benefits
  • Fulltime
Read More
Arrow Right

Cloud Defensive Security Engineer

As a Defensive Security Engineer, you will be part of the Cloud Defense team wit...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience designing, operating and troubleshooting Elastic deployments in production (on-prem or cloud-managed)
  • Experience building and operating log/telemetry pipelines into Elastic (Filebeat/Metricbeat/other Beats, Elastic Agent, Logstash, ingest pipelines)
  • Proficiency with Kibana: dashboards, visualisations, Lens, saved searches, alerting and spaces
  • Solid understanding of distributed systems basics relevant to Elastic (indexing, sharding, replication, cluster health)
  • Elastic Certified Engineer (or equivalent depth of experience), however certification is a plus
  • Experience with infrastructure-as-code (e.g. Terraform, Ansible, CloudFormation) to deploy and manage infrastructure
  • Experience with CI/CD pipelines (GitHub Actions, Jenkins, etc…) to automate configuration and infrastructure deployments
  • Hands-on experience with Linux systems, containers and Kubernetes (EKS or vanilla deployments)
  • Experience with public cloud environments, preferably AWS and/or GCP (cloud logging, IAM basics, network fundamentals)
  • Good understanding of core security and SOC concepts: logs vs events vs alerts, detections, triage and investigations
Job Responsibility
Job Responsibility
  • Redesign, evolve and operate our Elastic stack (Elasticsearch, Kibana, Elastic Security/Observability) as a core part of the Defensive platform
  • Own the ingestion pipelines for security and infrastructure telemetry (e.g. AWS/GCP audit logs, EDR telemetry, OS/syslog from Linux fleets and key application logs from our core products), including Beats/Agents, ingest pipelines and index lifecycle management
  • Pragmatically optimise Elastic for performance, scalability, cost and reliability (index strategy, shard planning, hot/warm/cold, retention policies)
  • Define and maintain standards and templates for indices, data streams, mappings and dashboards
  • Implement and maintain detection content in Elastic (KQL/EQL queries, rules, anomaly jobs) following defense-as-code practices: versioning, code reviews, testing and CI/CD
  • Collaborate with engineering teams, SOC and Incident Response to translate threat scenarios and cloud/runtime risks into Elastic rules, alerts and dashboards
  • Improve detections to reduce false positives and improve signal quality, based on feedback from SOC, IR and product teams
  • Contribute to internal tooling that improves detection engineering (e.g. shared rule templates, test harnesses, linters, rule packaging)
  • Manage Elastic infrastructure, data pipelines, and content deployments using IaC tools (Terraform, CloudFormation) and CI/CD platforms (GitHub Actions, Argo CD)
  • Integrate Elastic with other security and cloud services (e.g. EDR agents, cloud-native security tools, ticketing, notification channels, SOAR) to support end-to-end defensive workflows
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • Fulltime
Read More
Arrow Right

Cloud Defensive Security Engineer

As a Defensive Security Engineer, you will be part of the Cloud Defense team wit...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience designing, operating and troubleshooting Elastic deployments in production (on-prem or cloud-managed)
  • Experience building and operating log/telemetry pipelines into Elastic (Filebeat/Metricbeat/other Beats, Elastic Agent, Logstash, ingest pipelines)
  • Proficiency with Kibana: dashboards, visualisations, Lens, saved searches, alerting and spaces
  • Solid understanding of distributed systems basics relevant to Elastic (indexing, sharding, replication, cluster health)
  • Elastic Certified Engineer (or equivalent depth of experience), however certification is a plus
  • Experience with infrastructure-as-code (e.g. Terraform, Ansible, CloudFormation) to deploy and manage infrastructure
  • Experience with CI/CD pipelines (GitHub Actions, Jenkins, etc…) to automate configuration and infrastructure deployments
  • Hands-on experience with Linux systems, containers and Kubernetes (EKS or vanilla deployments)
  • Experience with public cloud environments, preferably AWS and/or GCP (cloud logging, IAM basics, network fundamentals)
  • Good understanding of core security and SOC concepts: logs vs events vs alerts, detections, triage and investigations
Job Responsibility
Job Responsibility
  • Redesign, evolve and operate our Elastic stack (Elasticsearch, Kibana, Elastic Security/Observability) as a core part of the Defensive platform
  • Own the ingestion pipelines for security and infrastructure telemetry (e.g. AWS/GCP audit logs, EDR telemetry, OS/syslog from Linux fleets and key application logs from our core products), including Beats/Agents, ingest pipelines and index lifecycle management
  • Pragmatically optimise Elastic for performance, scalability, cost and reliability (index strategy, shard planning, hot/warm/cold, retention policies)
  • Define and maintain standards and templates for indices, data streams, mappings and dashboards
  • Implement and maintain detection content in Elastic (KQL/EQL queries, rules, anomaly jobs) following defense-as-code practices: versioning, code reviews, testing and CI/CD
  • Collaborate with engineering teams, SOC and Incident Response to translate threat scenarios and cloud/runtime risks into Elastic rules, alerts and dashboards
  • Improve detections to reduce false positives and improve signal quality, based on feedback from SOC, IR and product teams
  • Contribute to internal tooling that improves detection engineering (e.g. shared rule templates, test harnesses, linters, rule packaging)
  • Manage Elastic infrastructure, data pipelines, and content deployments using IaC tools (Terraform, CloudFormation) and CI/CD platforms (GitHub Actions, Argo CD)
  • Integrate Elastic with other security and cloud services (e.g. EDR agents, cloud-native security tools, ticketing, notification channels, SOAR) to support end-to-end defensive workflows
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • Fulltime
Read More
Arrow Right

Defensive Security Engineer

As the Defensive Security Engineer, you will be part of the company’s Incident R...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • An experienced security analyst with the mentioned solutions and resolving security incidents in large enterprise environments
  • Familiar with Incident Management At Google (IMAG)
  • Structured, analytical, autonomous and proactive persona
  • Familiar with the Agile methodology
  • Experience with security frameworks and methodologies such as MITRE ATT&CK, ENISA or NIST
  • You have a hacker and an open mindset
  • You have software development skills
  • You have a good understanding of AWS Cloud technologies, services, security capabilities, and controls such as SCPs, Security Groups, IAM, etc.
  • You understand SDLC (coding and development) with modern tooling and ecosystems such as Kubernetes, Github, Github Action, infrastructure as code, etc.
  • You have excellent knowledge of security for networks, protocols, systems and applications
Job Responsibility
Job Responsibility
  • Contribute to the Incident Response (IR) team’s efforts by fostering a culture of proactive defence and continuous improvement through active participation in response processes and initiatives
  • Actively participate in the incident response lifecycle, including preparation, detection, analysis, containment, eradication, recovery and learning, ensuring timely and effective responses to potential threats
  • Support the development and refinement of incident response policies, playbooks, escalation procedures, and tabletop exercises
  • Contribute to post-mortem analyses to improve incident detection and response capabilities continuously
  • Work closely with other relevant teams and roles, such as the DPO, Privacy, Global Incident Teams, the rest of the InfoSec teams, and E&C, ensuring effective communication and alignment during incident response efforts
  • Assist in managing the external MSSP by ensuring alignment with organisational policies, standards, and expectations regarding service quality
  • Collaborate with the SOC team to monitor and assess the performance of security monitoring, triage, and alerting processes, contributing to optimising SOC operations and improving efficiency
  • Participate in the operations and enhance the control of defensive security technologies, including EDR, SIEM, DLP, NIDS, and threat intelligence solutions
  • Gather, analyse, and operationalise threat intelligence information to enhance detection, response, and prevention efforts, ensuring timely identification and mitigation of potential threats
  • Collaborate to prepare periodic reports and collaborate with cross-functional teams to share valuable insights gained from alerts and incidents
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • Fulltime
Read More
Arrow Right

Defensive Security Engineer

As the Defensive Security Engineer, you will be part of the company’s Incident R...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
adevinta.com Logo
Adevinta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • An experienced security analyst with the mentioned solutions and resolving security incidents in large enterprise environments
  • Familiar with Incident Management At Google (IMAG)
  • Structured, analytical, autonomous and proactive persona
  • Familiar with the Agile methodology
  • Experience with security frameworks and methodologies such as MITRE ATT&CK, ENISA or NIST
  • You have a hacker and an open mindset
  • You have software development skills
  • You have a good understanding of AWS Cloud technologies, services, security capabilities, and controls such as SCPs, Security Groups, IAM, etc.
  • You understand SDLC (coding and development) with modern tooling and ecosystems such as Kubernetes, Github, Github Action, infrastructure as code, etc.
  • You have excellent knowledge of security for networks, protocols, systems and applications
Job Responsibility
Job Responsibility
  • Contribute to the Incident Response (IR) team’s efforts by fostering a culture of proactive defence and continuous improvement through active participation in response processes and initiatives
  • Actively participate in the incident response lifecycle, including preparation, detection, analysis, containment, eradication, recovery and learning, ensuring timely and effective responses to potential threats
  • Support the development and refinement of incident response policies, playbooks, escalation procedures, and tabletop exercises
  • Contribute to post-mortem analyses to improve incident detection and response capabilities continuously
  • Work closely with other relevant teams and roles, such as the DPO, Privacy, Global Incident Teams, the rest of the InfoSec teams, and E&C, ensuring effective communication and alignment during incident response efforts
  • Assist in managing the external MSSP by ensuring alignment with organisational policies, standards, and expectations regarding service quality
  • Collaborate with the SOC team to monitor and assess the performance of security monitoring, triage, and alerting processes, contributing to optimising SOC operations and improving efficiency
  • Participate in the operations and enhance the control of defensive security technologies, including EDR, SIEM, DLP, NIDS, and threat intelligence solutions
  • Gather, analyse, and operationalise threat intelligence information to enhance detection, response, and prevention efforts, ensuring timely identification and mitigation of potential threats
  • Collaborate to prepare periodic reports and collaborate with cross-functional teams to share valuable insights gained from alerts and incidents
What we offer
What we offer
  • An attractive Base Salary
  • Participation in our Short Term Incentive plan (annual bonus)
  • Work From Anywhere: Enjoy up to 20 days a year of working from anywhere
  • A 24/7 Employee Assistance Program for you and your family
  • A range of locally relevant benefits
  • Fulltime
Read More
Arrow Right

Cyber Security Defense Head of Department

The Cyber Security Defense Head of Department (HOD) will lead and mature our org...
Location
Location
United States , Irvine
Salary
Salary:
181240.00 - 259160.00 USD / Year
haeaus.com Logo
Hyundai AutoEver America
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 15–20 years of progressive experience across the various cyber defense disciplines (SOC, Incident Response, Red/Blue teams, or similar defensive/offensive functions)
  • Proven experience leading cyber defense teams
  • Demonstrated ability to hire, mentor, and lead high-performing technical teams
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or a related discipline
  • Strong knowledge of threat detection, incident response, adversary tactics (MITRE ATT&CK), vulnerability management, and secure software development
  • Excellent incident management, communication, and executive reporting skills
  • Proficient in English for effective communication and coordination
  • In the absence of IR team members, utilize a flexible work schedule to facilitate the security incident response process for high/critical incidents
Job Responsibility
Job Responsibility
  • Develop and execute the Cyber Defense strategy aligned with organizational goals, customer requirements and the evolving threat landscapes
  • Establish frameworks, processes, and KPIs for SOC, Incident Response, TVM, AppSec, Red/Blue Teaming, and Adversary Simulation
  • Serve as a senior advisor to the CISO and executive leadership on cyber risks, readiness, and emerging threats
  • Oversee 24x7 SOC operations, ensuring effective monitoring, detection, and response to security events, across levels 1-3
  • Drive continuous enhancement of detection engineering, threat hunting, and security analytics
  • Implement best-in-class security tooling, automation, and operational processes
  • Lead internal Red Team and offensive security capabilities, including penetration testing
  • Define testing methodologies, operational rules of engagement, and reporting standards
  • Translate offensive findings into actionable improvements for defensive teams and architecture
  • Oversee the Incident Response program, ensuring rapid and effective handling of security incidents
  • Fulltime
Read More
Arrow Right

Deputy Chief Information Security Officer

Fox Corporation is seeking an exceptional Deputy Chief Information Security Offi...
Location
Location
United States , Los Angeles
Salary
Salary:
352000.00 - 450000.00 USD / Year
foxnews.com Logo
Fox News Media
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7+ years of experience in cybersecurity leadership roles, ideally within large-scale enterprises or complex, distributed organizations
  • Strong knowledge of the NIST Cybersecurity Framework and enterprise risk management principles
  • Extensive experience leading complex security governance, enterprise architecture, and vulnerability management efforts
  • Proven ability to operate in ambiguity, making clear, timely decisions even when information is limited or incomplete
  • Experience securing consumer-facing applications and high-visibility digital platforms, with an understanding of performance, scalability, and user impact
  • Proven success operating and optimizing flagship enterprise security technologies and platforms
  • Exceptional communication and partnership skills, enabling effective collaboration with executives, legal teams, engineers, and external stakeholders
  • Proven expertise in incident response, threat detection engineering, and security operations at scale
  • Demonstrated ability to lead and inspire high-performing, cross-functional teams
Job Responsibility
Job Responsibility
  • Drive execution of FOX’s forward-leaning cybersecurity strategy, applying a practical, risk-based approach to protect the company’s most critical assets and enable secure business innovation
  • Ensure alignment with the NIST Cybersecurity Framework and drive continuous improvement across processes, controls, and capabilities
  • Partner with Technology, Product, Engineering, and Broadcast teams to ensure security enables innovation across cloud, infrastructure, media distribution, and emerging platforms
  • Lead security operations, engineering, architecture, and trust & safety, emphasizing secure-by-design thinking, automation, and modern approaches that maximize impact and efficiency
  • Conduct and oversee technical tabletop exercises, red/purple team engagements, adversary emulation, and readiness assessments
  • integrate findings into improved defenses, architectural decisions, and incident response plans
  • Serve as senior technical escalation for complex incidents and investigations, ensuring rapid response, evidence-driven decision-making, and close coordination with Legal, IR partners, and outside counsel when appropriate
  • Lead cyber operations, including a forward-leaning, highly automated SOC, advanced threat detection engineering, and continuous optimization of detections, telemetry, and response workflows
  • Maintain deep situational awareness of the global threat landscape, cloud architectures, adversary tradecraft, and emerging technologies to ensure FOX stays ahead of evolving risks
  • Mentor and develop high-performing teams while fostering a culture of innovation and continuous improvement
What we offer
What we offer
  • medical/dental/vision, insurance, a 401(k) plan, paid time off, and other benefits in accordance with applicable plan documents
  • Fulltime
Read More
Arrow Right

Cyber Defense Head of Department

The Cyber Security Defense Head of Department (HOD) will lead and mature our org...
Location
Location
United States , Irvine
Salary
Salary:
181240.00 - 259160.00 USD / Year
haeaus.com Logo
Hyundai AutoEver America
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 15–20 years of progressive experience across the various cyber defense disciplines (SOC, Incident Response, Red/Blue teams, or similar defensive/offensive functions)
  • Proven experience leading cyber defense teams
  • Demonstrated ability to hire, mentor, and lead high-performing technical teams
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science or a related discipline
  • Strong knowledge of threat detection, incident response, adversary tactics (MITRE ATT&CK), vulnerability management, and secure software development
  • Excellent incident management, communication, and executive reporting skills
  • Proficient in English for effective communication and coordination
  • In the absence of IR team members, utilize a flexible work schedule to facilitate the security incident response process for high/critical incidents
Job Responsibility
Job Responsibility
  • Develop and execute the Cyber Defense strategy aligned with organizational goals, customer requirements and the evolving threat landscapes
  • Establish frameworks, processes, and KPIs for SOC, Incident Response, TVM, AppSec, Red/Blue Teaming, and Adversary Simulation
  • Serve as a senior advisor to the CISO and executive leadership on cyber risks, readiness, and emerging threats
  • Oversee 24x7 SOC operations, ensuring effective monitoring, detection, and response to security events, across levels 1-3
  • Drive continuous enhancement of detection engineering, threat hunting, and security analytics
  • Implement best-in-class security tooling, automation, and operational processes
  • Lead internal Red Team and offensive security capabilities, including penetration testing
  • Define testing methodologies, operational rules of engagement, and reporting standards
  • Translate offensive findings into actionable improvements for defensive teams and architecture
  • Oversee the Incident Response program, ensuring rapid and effective handling of security incidents
  • Fulltime
Read More
Arrow Right