Encuentra el trabajo de
tus sueños AQUÍ
¡Explora nuestras vacantes disponibles y APLICA!
6COBB - COL Bogota - Cl. 116 #21-50, Bogotá, Colombia
Cyber Threat, Vulnerability and Security Infrastructure Lead - Bilingual English/Spanish
Information Technology / Full-Time
PostúlateOverview:
We are seeking a bilingual, experienced and highly skilled Cyber Threat, Vulnerability and Security Infrastructure Lead to join our dynamic team and take responsibility for managing the organization's security infrastructure, vulnerability management, and threat intelligence & hunting activities. The ideal candidate will possess a deep understanding of security best practices and tools, demonstrate a proactive approach to vulnerability identification and remediation, and have hands-on experience with threat intelligence gathering and threat hunting techniques. This leadership role will involve working with cross-functional teams, collaborating with IT and other departments, and ensuring that security protocols are aligned with business objectives to protect critical assets from emerging cyber threats.
This position is 100% remote in Colombia.
Responsibilities:
- Security Infrastructure Management:
- Lead and manage the design, implementation, operation and maintenance of enterprise security infrastructure.
- Oversee the deployment and management of security technologies such as CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.
- Monitor and ensure the availability and operational effectiveness of security controls to protect against internal and external threats.
- Vulnerability Management:
- Lead vulnerability management efforts, including regular vulnerability assessments and scanning across all systems and applications. The following types of tests must be planned, scheduled and performed :
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Interactive Application Security Testing (IAST)
- Software Composition Analysis (SCA)
- Infrastructure Vulnerability Scanning
- Container Vulnerability Scanning
- Identify, assess, and prioritize vulnerabilities based on risk and impact, and coordinate the remediation process across relevant teams.
- Track and report on vulnerability mitigation progress and ensure compliance with internal and external security requirements.
- Collaborate with development and IT teams to ensure that security best practices are integrated into the Secure software development life cycle (SSDLC) to avoid known vulnerabilities.
- Threat Intelligence and Threat Hunting:
- Manage the threat intelligence lifecycle, including the collection, analysis, and dissemination of actionable threat intelligence to proactively identify and mitigate potential cyber threats.
- Lead threat hunting efforts to actively search for indicators of compromise (IOCs), advanced persistent threats (APTs), and other malicious activity within the organization's networks and systems.
- Work with internal teams and external vendors to enhance threat intelligence feeds, ensuring they are current and relevant.
- Identify and provide the latest threat landscape and intelligence findings as input to develop and update incident response playbooks.
- Provide strategic recommendations to leadership based on emerging threats and security trends.
- Leadership, Collaboration & Reporting:
- Identify, design, plan and lead implementation of automation opportunities.
- Continuous improvement of the processes under your responsibility.
- Collaborate with cross-functional teams (e.g., IT, development, operations) to ensure alignment of security practices with internal and external security requirements.
- Lead the evaluation and selection of third-party vendors or tools for threat, vulnerability and security infrastructure management.
- Provide expert guidance on threat and vulnerability management to all levels of the organization.
- Provide regular status reports and metrics on threat, vulnerability and security infrastructure management to senior leadership, offering actionable insights and recommendations for improvements.
Qualifications:
- Bilingual (English - Spanish) B2/C1.
- Education:
- Bachelor’s degree in computer science. Post-graduate degree in cyber/information security is a plus.
- Certifications:
- CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) preferred.
- CEH and/or technical certifications related to threat intelligence, threat hunting and/or vulnerability management are highly desirable.
- Experience:
- 7+ years of experience in cybersecurity, with at least 3 years in a threat intelligence, threat hunting and vulnerability management leadership role.
- Proven experience in security infrastructure management, security technologies (e.g., CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.)
- Proven experience in vulnerability management, risk assessment and threat intelligence.
- Hands-on experience in threat hunting, leveraging tools such as ELK stack, Splunk, and similar platforms.
- Experience with cloud security is a plus (Azure, AWS, Google Cloud, etc.).
- Skills and Competencies:
- Strong knowledge of network services and protocols, security protocols and technologies.
- Strong knowledge of vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and patch management platforms.
- Strong knowledge of threat intelligence platforms and frameworks (e.g., MISP, STIX, TAXII, MITRE ATT&CK).
- Communication and presentation skills, with the ability to engage stakeholders.
- Ability to stay current and adapt quickly to new regulations, emerging security trends, tools, and technologies.
- Strong problem-solving and analytical skills, with the ability to manage complex security challenges.
#IN-ALIL
Postúlate aquíCyber Threat, Vulnerability and Security Infrastructure Lead - Bilingual English/Spanish
6COBB - COL Bogota - Cl. 116 #21-50, Bogotá, Colombia
Información del empleo
Categoría: Information Technology
Disponibilidad: Full-Time
Descripción completa del empleo
Overview:
We are seeking a bilingual, experienced and highly skilled Cyber Threat, Vulnerability and Security Infrastructure Lead to join our dynamic team and take responsibility for managing the organization's security infrastructure, vulnerability management, and threat intelligence & hunting activities. The ideal candidate will possess a deep understanding of security best practices and tools, demonstrate a proactive approach to vulnerability identification and remediation, and have hands-on experience with threat intelligence gathering and threat hunting techniques. This leadership role will involve working with cross-functional teams, collaborating with IT and other departments, and ensuring that security protocols are aligned with business objectives to protect critical assets from emerging cyber threats.
This position is 100% remote in Colombia.
Responsibilities:
- Security Infrastructure Management:
- Lead and manage the design, implementation, operation and maintenance of enterprise security infrastructure.
- Oversee the deployment and management of security technologies such as CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.
- Monitor and ensure the availability and operational effectiveness of security controls to protect against internal and external threats.
- Vulnerability Management:
- Lead vulnerability management efforts, including regular vulnerability assessments and scanning across all systems and applications. The following types of tests must be planned, scheduled and performed :
- Static Application Security Testing (SAST)
- Dynamic Application Security Testing (DAST)
- Interactive Application Security Testing (IAST)
- Software Composition Analysis (SCA)
- Infrastructure Vulnerability Scanning
- Container Vulnerability Scanning
- Identify, assess, and prioritize vulnerabilities based on risk and impact, and coordinate the remediation process across relevant teams.
- Track and report on vulnerability mitigation progress and ensure compliance with internal and external security requirements.
- Collaborate with development and IT teams to ensure that security best practices are integrated into the Secure software development life cycle (SSDLC) to avoid known vulnerabilities.
- Threat Intelligence and Threat Hunting:
- Manage the threat intelligence lifecycle, including the collection, analysis, and dissemination of actionable threat intelligence to proactively identify and mitigate potential cyber threats.
- Lead threat hunting efforts to actively search for indicators of compromise (IOCs), advanced persistent threats (APTs), and other malicious activity within the organization's networks and systems.
- Work with internal teams and external vendors to enhance threat intelligence feeds, ensuring they are current and relevant.
- Identify and provide the latest threat landscape and intelligence findings as input to develop and update incident response playbooks.
- Provide strategic recommendations to leadership based on emerging threats and security trends.
- Leadership, Collaboration & Reporting:
- Identify, design, plan and lead implementation of automation opportunities.
- Continuous improvement of the processes under your responsibility.
- Collaborate with cross-functional teams (e.g., IT, development, operations) to ensure alignment of security practices with internal and external security requirements.
- Lead the evaluation and selection of third-party vendors or tools for threat, vulnerability and security infrastructure management.
- Provide expert guidance on threat and vulnerability management to all levels of the organization.
- Provide regular status reports and metrics on threat, vulnerability and security infrastructure management to senior leadership, offering actionable insights and recommendations for improvements.
Qualifications:
- Bilingual (English - Spanish) B2/C1.
- Education:
- Bachelor’s degree in computer science. Post-graduate degree in cyber/information security is a plus.
- Certifications:
- CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) preferred.
- CEH and/or technical certifications related to threat intelligence, threat hunting and/or vulnerability management are highly desirable.
- Experience:
- 7+ years of experience in cybersecurity, with at least 3 years in a threat intelligence, threat hunting and vulnerability management leadership role.
- Proven experience in security infrastructure management, security technologies (e.g., CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.)
- Proven experience in vulnerability management, risk assessment and threat intelligence.
- Hands-on experience in threat hunting, leveraging tools such as ELK stack, Splunk, and similar platforms.
- Experience with cloud security is a plus (Azure, AWS, Google Cloud, etc.).
- Skills and Competencies:
- Strong knowledge of network services and protocols, security protocols and technologies.
- Strong knowledge of vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and patch management platforms.
- Strong knowledge of threat intelligence platforms and frameworks (e.g., MISP, STIX, TAXII, MITRE ATT&CK).
- Communication and presentation skills, with the ability to engage stakeholders.
- Ability to stay current and adapt quickly to new regulations, emerging security trends, tools, and technologies.
- Strong problem-solving and analytical skills, with the ability to manage complex security challenges.
#IN-ALIL