Job Details - Quetzal

Encuentra el trabajo de
tus sueños AQUÍ

¡Explora nuestras vacantes disponibles y APLICA!

6COBB - COL Bogota - Cl. 116 #21-50, Bogotá, Colombia

Cyber Threat, Vulnerability and Security Infrastructure Lead - Bilingual English/Spanish

Information Technology / Full-Time

Postúlate

Overview:

We are seeking a bilingual, experienced and highly skilled Cyber Threat, Vulnerability and Security Infrastructure Lead to join our dynamic team and take responsibility for managing the organization's security infrastructure, vulnerability management, and threat intelligence & hunting activities. The ideal candidate will possess a deep understanding of security best practices and tools, demonstrate a proactive approach to vulnerability identification and remediation, and have hands-on experience with threat intelligence gathering and threat hunting techniques. This leadership role will involve working with cross-functional teams, collaborating with IT and other departments, and ensuring that security protocols are aligned with business objectives to protect critical assets from emerging cyber threats.

 

This position is 100% remote in Colombia.

Responsibilities:

  • Security Infrastructure Management:
      • Lead and manage the design, implementation, operation and maintenance of enterprise security infrastructure.
      • Oversee the deployment and management of security technologies such as CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.
      • Monitor and ensure the availability and operational effectiveness of security controls to protect against internal and external threats.
  • Vulnerability Management:
  • Lead vulnerability management efforts, including regular vulnerability assessments and scanning across all systems and applications. The following types of tests must be planned, scheduled and performed :
    • Static Application Security Testing (SAST)
    • Dynamic Application Security Testing (DAST)
    • Interactive Application Security Testing (IAST)
    • Software Composition Analysis (SCA)
    • Infrastructure Vulnerability Scanning
    • Container Vulnerability Scanning
  • Identify, assess, and prioritize vulnerabilities based on risk and impact, and coordinate the remediation process across relevant teams.
  • Track and report on vulnerability mitigation progress and ensure compliance with internal and external security requirements.
  • Collaborate with development and IT teams to ensure that security best practices are integrated into the Secure software development life cycle (SSDLC) to avoid known vulnerabilities.
  • Threat Intelligence and Threat Hunting:
    • Manage the threat intelligence lifecycle, including the collection, analysis, and dissemination of actionable threat intelligence to proactively identify and mitigate potential cyber threats.
    • Lead threat hunting efforts to actively search for indicators of compromise (IOCs), advanced persistent threats (APTs), and other malicious activity within the organization's networks and systems.
    • Work with internal teams and external vendors to enhance threat intelligence feeds, ensuring they are current and relevant.
    • Identify and provide the latest threat landscape and intelligence findings as input to develop and update incident response playbooks.
    • Provide strategic recommendations to leadership based on emerging threats and security trends.
  • Leadership, Collaboration & Reporting:
  • Identify, design, plan and lead implementation of automation opportunities.
  • Continuous improvement of the processes under your responsibility.
  • Collaborate with cross-functional teams (e.g., IT, development, operations) to ensure alignment of security practices with internal and external security requirements.
  • Lead the evaluation and selection of third-party vendors or tools for threat, vulnerability and security infrastructure management.
  • Provide expert guidance on threat and vulnerability management to all levels of the organization.
  • Provide regular status reports and metrics on threat, vulnerability and security infrastructure management to senior leadership, offering actionable insights and recommendations for improvements.

Qualifications:

    • Bilingual (English - Spanish) B2/C1.
    • Education:
      • Bachelor’s degree in computer science. Post-graduate degree in cyber/information security is a plus.
    • Certifications:
      • CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) preferred.
      • CEH and/or technical certifications related to threat intelligence, threat hunting and/or vulnerability management are highly desirable.
    • Experience:
      • 7+ years of experience in cybersecurity, with at least 3 years in a threat intelligence, threat hunting and vulnerability management leadership role.
      • Proven experience in security infrastructure management, security technologies (e.g., CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.)
      • Proven experience in vulnerability management, risk assessment and threat intelligence.
      • Hands-on experience in threat hunting, leveraging tools such as ELK stack, Splunk, and similar platforms.
      • Experience with cloud security is a plus (Azure, AWS, Google Cloud, etc.).
  • Skills and Competencies:
    • Strong knowledge of network services and protocols, security protocols and technologies.
    • Strong knowledge of vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and patch management platforms.
    • Strong knowledge of threat intelligence platforms and frameworks (e.g., MISP, STIX, TAXII, MITRE ATT&CK).
  • Communication and presentation skills, with the ability to engage stakeholders.
  • Ability to stay current and adapt quickly to new regulations, emerging security trends, tools, and technologies.
  • Strong problem-solving and analytical skills, with the ability to manage complex security challenges.

 

#IN-ALIL

Postúlate aquí

Cyber Threat, Vulnerability and Security Infrastructure Lead - Bilingual English/Spanish

6COBB - COL Bogota - Cl. 116 #21-50, Bogotá, Colombia


Información del empleo

Categoría: Information Technology

Disponibilidad: Full-Time


Descripción completa del empleo

Overview:

We are seeking a bilingual, experienced and highly skilled Cyber Threat, Vulnerability and Security Infrastructure Lead to join our dynamic team and take responsibility for managing the organization's security infrastructure, vulnerability management, and threat intelligence & hunting activities. The ideal candidate will possess a deep understanding of security best practices and tools, demonstrate a proactive approach to vulnerability identification and remediation, and have hands-on experience with threat intelligence gathering and threat hunting techniques. This leadership role will involve working with cross-functional teams, collaborating with IT and other departments, and ensuring that security protocols are aligned with business objectives to protect critical assets from emerging cyber threats.

 

This position is 100% remote in Colombia.

Responsibilities:

  • Security Infrastructure Management:
      • Lead and manage the design, implementation, operation and maintenance of enterprise security infrastructure.
      • Oversee the deployment and management of security technologies such as CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.
      • Monitor and ensure the availability and operational effectiveness of security controls to protect against internal and external threats.
  • Vulnerability Management:
  • Lead vulnerability management efforts, including regular vulnerability assessments and scanning across all systems and applications. The following types of tests must be planned, scheduled and performed :
    • Static Application Security Testing (SAST)
    • Dynamic Application Security Testing (DAST)
    • Interactive Application Security Testing (IAST)
    • Software Composition Analysis (SCA)
    • Infrastructure Vulnerability Scanning
    • Container Vulnerability Scanning
  • Identify, assess, and prioritize vulnerabilities based on risk and impact, and coordinate the remediation process across relevant teams.
  • Track and report on vulnerability mitigation progress and ensure compliance with internal and external security requirements.
  • Collaborate with development and IT teams to ensure that security best practices are integrated into the Secure software development life cycle (SSDLC) to avoid known vulnerabilities.
  • Threat Intelligence and Threat Hunting:
    • Manage the threat intelligence lifecycle, including the collection, analysis, and dissemination of actionable threat intelligence to proactively identify and mitigate potential cyber threats.
    • Lead threat hunting efforts to actively search for indicators of compromise (IOCs), advanced persistent threats (APTs), and other malicious activity within the organization's networks and systems.
    • Work with internal teams and external vendors to enhance threat intelligence feeds, ensuring they are current and relevant.
    • Identify and provide the latest threat landscape and intelligence findings as input to develop and update incident response playbooks.
    • Provide strategic recommendations to leadership based on emerging threats and security trends.
  • Leadership, Collaboration & Reporting:
  • Identify, design, plan and lead implementation of automation opportunities.
  • Continuous improvement of the processes under your responsibility.
  • Collaborate with cross-functional teams (e.g., IT, development, operations) to ensure alignment of security practices with internal and external security requirements.
  • Lead the evaluation and selection of third-party vendors or tools for threat, vulnerability and security infrastructure management.
  • Provide expert guidance on threat and vulnerability management to all levels of the organization.
  • Provide regular status reports and metrics on threat, vulnerability and security infrastructure management to senior leadership, offering actionable insights and recommendations for improvements.

Qualifications:

    • Bilingual (English - Spanish) B2/C1.
    • Education:
      • Bachelor’s degree in computer science. Post-graduate degree in cyber/information security is a plus.
    • Certifications:
      • CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) preferred.
      • CEH and/or technical certifications related to threat intelligence, threat hunting and/or vulnerability management are highly desirable.
    • Experience:
      • 7+ years of experience in cybersecurity, with at least 3 years in a threat intelligence, threat hunting and vulnerability management leadership role.
      • Proven experience in security infrastructure management, security technologies (e.g., CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.)
      • Proven experience in vulnerability management, risk assessment and threat intelligence.
      • Hands-on experience in threat hunting, leveraging tools such as ELK stack, Splunk, and similar platforms.
      • Experience with cloud security is a plus (Azure, AWS, Google Cloud, etc.).
  • Skills and Competencies:
    • Strong knowledge of network services and protocols, security protocols and technologies.
    • Strong knowledge of vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and patch management platforms.
    • Strong knowledge of threat intelligence platforms and frameworks (e.g., MISP, STIX, TAXII, MITRE ATT&CK).
  • Communication and presentation skills, with the ability to engage stakeholders.
  • Ability to stay current and adapt quickly to new regulations, emerging security trends, tools, and technologies.
  • Strong problem-solving and analytical skills, with the ability to manage complex security challenges.

 

#IN-ALIL

Tips para ser el mejor candidato

Preguntas frecuentes

Quetzal Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors.Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco labors.