Ethical Hacking Engineer
Hoy
Trabajo visto
Descripción Del Trabajo
Get AI-powered advice on this job and more exclusive features.
Direct message the job poster from Telefónica Tech
Global Talent Acquisition & Employer Branding ManagerDeseable:
- OSCP/OSEP
- CARTP
Idiomas
Deseable:
Seniority level- Associate
- Full-time
- Analyst, Information Technology, and Writing/Editing
- Telecommunications
Referrals increase your chances of interviewing at Telefónica Tech by 2x
#J-18808-LjbffrPentester L2 | Ethical Hacking y Seguridad
Hoy
Trabajo visto
Descripción Del Trabajo
Evolutio nace después de más de 30 años prestando servicios en el mercado español con la marca BT (British Telecom) con una nueva visión: ser el socio de confianza que acompaña a las empresas en el proceso de Transformación asociado a la adopción de las tecnologías Cloud.
Nuestro portfolio incluye soluciones NETWORK EDG E de última generación, infraestructura CLOUD que pone en valor su agilidad y economía de costes, las últimas soluciones para mejorar la EXPERIENCIA DIGITAL de sus clientes, y el diseño e implantación de la estrategia de CIBERSEGURIDAD más adecuada para su empresa.
¿Qué estamos buscando?
Nos gustaría incorporar a un Especialista en Pentester L2 | Ethical Hacking y Seguridad con los siguientes conocimientos:
• 5 años de trabajo de L2 en un SOC.
• Tener alguna de las siguientes certificaciones: CISSP, CISM, CompTIASecurity+ o similar.
• Tener alguna de las siguientes certificaciones de fabricantes de seguridad de perimetral: Fortigate, Palo Alto, F5, Cisco Security, etc.
• Amplia experiencia en análisis de vulnerabilidades, pentesting y auditorías de sistemas. Muy positivo, además, experiencias en caja Negra, caja Blanca y auditorias.
• Valorable prácticas de CTF o proyectos de seguridad.
• Valorable conocimientos de SIAM.
¿Qué ofrecemos?
Teletrabajo y oficina.
Pentester L2 | Ethical Hacking y Seguridad
Hoy
Trabajo visto
Descripción Del Trabajo
Evolutio nace después de más de 30 años prestando servicios en el mercado español con la marca BT (British Telecom) con una nueva visión: ser el socio de confianza que acompaña a las empresas en el proceso de Transformación asociado a la adopción de las tecnologías Cloud.
Nuestro portfolio incluye soluciones NETWORK EDG E de última generación, infraestructura CLOUD que pone en valor su agilidad y economía de costes, las últimas soluciones para mejorar la EXPERIENCIA DIGITAL de sus clientes, y el diseño e implantación de la estrategia de CIBERSEGURIDAD más adecuada para su empresa.
¿Qué estamos buscando?
Nos gustaría incorporar a un Especialista en Pentester L2 | Ethical Hacking y Seguridad con los siguientes conocimientos:
• 5 años de trabajo de L2 en un SOC.
• Tener alguna de las siguientes certificaciones: CISSP, CISM, CompTIASecurity+ o similar.
• Tener alguna de las siguientes certificaciones de fabricantes de seguridad de perimetral: Fortigate, Palo Alto, F5, Cisco Security, etc.
• Amplia experiencia en análisis de vulnerabilidades, pentesting y auditorías de sistemas. Muy positivo, además, experiencias en caja Negra, caja Blanca y auditorias.
• Valorable prácticas de CTF o proyectos de seguridad.
• Valorable conocimientos de SIAM.
¿Qué ofrecemos?
Teletrabajo y oficina.
Pentester L2 | Ethical Hacking Y Seguridad
Hoy
Trabajo visto
Descripción Del Trabajo
Evolutio nace después de más de 30 años prestando servicios en el mercado español con la marca BT (British Telecom) con una nueva visión: ser el socio de confianza que acompaña a las empresas en el proceso de Transformación asociado a la adopción de las tecnologías Cloud.
Nuestro portfolio incluye soluciones NETWORK EDG E de última generación, infraestructura CLOUD que pone en valor su agilidad y economía de costes, las últimas soluciones para mejorar la EXPERIENCIA DIGITAL de sus clientes, y el diseño e implantación de la estrategia de CIBERSEGURIDAD más adecuada para su empresa.
¿Qué estamos buscando?
Nos gustaría incorporar a un Especialista en Pentester L2 | Ethical Hacking y Seguridad con los siguientes conocimientos:
- 5 años de trabajo de L2 en un SOC.
- Tener alguna de las siguientes certificaciones: CISSP, CISM, CompTIASecurity+ o similar.
- Tener alguna de las siguientes certificaciones de fabricantes de seguridad de perimetral: Fortigate, Palo Alto, F5, Cisco Security, etc.
- Amplia experiencia en análisis de vulnerabilidades, pentesting y auditorías de sistemas. Muy positivo, además, experiencias en caja Negra, caja Blanca y auditorias.
- Valorable prácticas de CTF o proyectos de seguridad.
- Valorable conocimientos de SIAM.
¿Qué ofrecemos?
Teletrabajo y oficina.
Cyber Security Analyst
Hoy
Trabajo visto
Descripción Del Trabajo
Job Title: SOC Analyst – Level 2 & Level 3
Location: Madrid, Spain (Hybrid/On-site options available)
Job Type: Full-time
Language: English (Spanish is a plus)
Start Date: ASAP
About the Role
We are seeking experienced and motivated SOC Level 2 and Level 3 Analysts to join our growing Security Operations Center in Madrid. You will play a key role in monitoring, detecting, investigating, and responding to cybersecurity threats and incidents across our global infrastructure.
Key Responsibilities
SOC Analyst – Level 2:
- Monitor security alerts and logs using SIEM tools (e.g., Splunk, QRadar, Sentinel).
- Perform initial triage and investigation of security incidents.
- Escalate complex threats to Level 3 analysts with detailed context and recommendations.
- Analyze malware, phishing, and intrusion attempts to assess impact.
- Create and update incident tickets with findings and actions taken.
- Support vulnerability management and threat hunting activities.
- Collaborate with IT, infrastructure, and application teams on security-related events.
SOC Analyst – Level 3:
- Lead incident response efforts, including deep-dive forensic investigations.
- Develop and fine-tune detection rules, use cases, and playbooks.
- Perform threat intelligence correlation and attribution analysis.
- Support red team/blue team exercises and post-incident reviews.
- Mentor and support Level 1 and Level 2 SOC analysts.
- Collaborate with security engineering to implement security tools and improve SIEM/SOAR capabilities.
- Deliver threat briefings and incident reports to internal stakeholders.
Required Qualifications & Skills
For Level 2:
- 2–4 years of experience in a SOC, cybersecurity, or IT security role.
- Strong knowledge of SIEM platforms and log analysis.
- Good understanding of TCP/IP, networking protocols, firewalls, and endpoint protection.
- Familiarity with common threat vectors (malware, phishing, brute force, etc.).
- Certifications such as CompTIA Security+, CySA+, or CEH are a plus.
- Fluent in English; Spanish is an advantage.
For Level 3:
- 4–7+ years of experience in cybersecurity operations or threat detection & response.
- Expertise in SIEM, SOAR, EDR tools, and forensic analysis.
- Strong scripting skills (Python, PowerShell, etc.) for automation.
- Hands-on experience with incident response and threat intelligence.
- Relevant certifications such as GCIH, GCIA, OSCP, or CISSP .
- Strong communication and leadership skills.
Cyber Security Analyst
Hoy
Trabajo visto
Descripción Del Trabajo
Job Title: SOC Analyst – Level 2 & Level 3
Location: Madrid, Spain (Hybrid/On-site options available)
Job Type: Full-time
Language: English (Spanish is a plus)
Start Date: ASAP
About the Role
We are seeking experienced and motivated SOC Level 2 and Level 3 Analysts to join our growing Security Operations Center in Madrid. You will play a key role in monitoring, detecting, investigating, and responding to cybersecurity threats and incidents across our global infrastructure.
Key Responsibilities
SOC Analyst – Level 2:
- Monitor security alerts and logs using SIEM tools (e.g., Splunk, QRadar, Sentinel).
- Perform initial triage and investigation of security incidents.
- Escalate complex threats to Level 3 analysts with detailed context and recommendations.
- Analyze malware, phishing, and intrusion attempts to assess impact.
- Create and update incident tickets with findings and actions taken.
- Support vulnerability management and threat hunting activities.
- Collaborate with IT, infrastructure, and application teams on security-related events.
SOC Analyst – Level 3:
- Lead incident response efforts, including deep-dive forensic investigations.
- Develop and fine-tune detection rules, use cases, and playbooks.
- Perform threat intelligence correlation and attribution analysis.
- Support red team/blue team exercises and post-incident reviews.
- Mentor and support Level 1 and Level 2 SOC analysts.
- Collaborate with security engineering to implement security tools and improve SIEM/SOAR capabilities.
- Deliver threat briefings and incident reports to internal stakeholders.
Required Qualifications & Skills
For Level 2:
- 2–4 years of experience in a SOC, cybersecurity, or IT security role.
- Strong knowledge of SIEM platforms and log analysis.
- Good understanding of TCP/IP, networking protocols, firewalls, and endpoint protection.
- Familiarity with common threat vectors (malware, phishing, brute force, etc.).
- Certifications such as CompTIA Security+, CySA+, or CEH are a plus.
- Fluent in English; Spanish is an advantage.
For Level 3:
- 4–7+ years of experience in cybersecurity operations or threat detection & response.
- Expertise in SIEM, SOAR, EDR tools, and forensic analysis.
- Strong scripting skills (Python, PowerShell, etc.) for automation.
- Hands-on experience with incident response and threat intelligence.
- Relevant certifications such as GCIH, GCIA, OSCP, or CISSP .
- Strong communication and leadership skills.
Cyber Security Analyst
Hoy
Trabajo visto
Descripción Del Trabajo
Devoteam es una consultora europea líder enfocada en estrategia digital, plataformas tecnológicas, ciberseguridad y transformación empresarial a través de la tecnología.
La Tecnología está en nuestro ADN y creemos en ella como una palanca capaz de impulsar el cambio para mejorar, manteniendo un equilibrio que nos permite ofrecer a nuestra cartera de clientes herramientas tecnológicas de primer nivel pero siempre con la cercanía y profesionalidad de un equipo que actúa como guía durante el camino.
Devoteam lleva más de 25 años comprometidos con la tecnología al servicio de las personas. Con más de 10.000 personas en el grupo, en 20 países de Europa, Oriente Medio y África.
ResponsibilitiesPara incorporar de manera estable en nuestra unidad de proyectos Cyber Trust buscamos un Analista con experiencia en Respuesta a Incidentes de Ciberseguridad.
Por la naturaleza del proyecto, la modalidad de trabajo será presencial en Madrid capital.
Apoyar de manera proactiva la detección, análisis e investigación de incidentes de ciberseguridad, colaborando estrechamente con el Security Operations Center (SOC):
- Analizar técnicamente incidentes de ciberseguridad y apoyar al SOC en la comprensión de la causa raíz, contexto y posibles impactos.
- Colaborar con el SOC en el desarrollo y mejora de los casos de uso de monitorización , así como en la optimización de reglas de correlación, alertas y playbooks.
- Apoyar proactivamente al SOC en la identificación de oportunidades de mejora en la monitorización y respuesta a incidentes.
- Proponer recomendaciones técnicas para mejorar la visibilidad, la cobertura de detección y la calidad de la información gestionada por el SOC.
- Acompañar al SOC en la revisión de incidentes relevantes, brindando análisis y contexto adicional para la priorización y respuesta.
- Asegurar que las lecciones aprendidas tras un incidente se documenten y se traduzcan en acciones de mejora que el SOC pueda implementar.
- Participar en simulacros de incidentes y pruebas de preparación junto con el SOC y otros equipos técnicos.
- Apoyar en la comunicación técnica entre áreas internas, actuando como puente entre el SOC y equipos de infraestructura, redes, cloud o aplicaciones.
- Contribuir a la documentación técnica de incidentes y a la generación de reportes ejecutivos cuando se requiera.
- Herramientas de monitorización : SIEM, EDR, IDS/IPS, XDR
- Procesos de análisis forense, revisión de logs, tráfico de red
- Gestión técnica de incidentes y revisiones post-evento
- Coordinación con equipos SOC (interno o tercerizado)
Inglés B2
#J-18808-LjbffrSé el primero en saberlo
Acerca de lo último Ceh Empleos en Madrid !
Information Security Analyst
Hoy
Trabajo visto
Descripción Del Trabajo
The Information Security Analyst is responsible for the delivery of Security Education Training and Awareness (SETA) product and services: education service: delivering a security training program to further develop our teams working in information security;
training service: implement training for all employees using our information security governance framework and addressing cyber security business needs;
design and implement engaging and fun information and cyber security awareness campaigns across the Liebherr group divisions and companies.
LOCATION: Please note that the working location for this position will be in Madrid city centre where we are currently setting up a new office location. Until the office is fully set-up within the next few months you will have the possibility to work flexibly from home-office and continue with a hybrid working model position is not a fully remote position and an onsite presence will be required once our office location is ready.
Responsibilities- Security Education: Develop and deliver education tracks to further develop our teams working in information and cybersecurity including curriculums for technical security and aligned with the NICE framework
- Security Training: Design and implement a training service covering all employee groups / job roles across the group addressesing cyber threats and business security risks regulatory and customer security requirements
- Security Awareness: Develop and implement engaging security awareness campaigns leveraging creative formats and adaptive delivery methods (e.G. Cybersecurity Awareness Month mascots branded merchandise). Operate a continuous training and awareness testing program including phishing simulations and gamification
- Continuously adapt and tailor the SETA product and services and delivery to reflect regional cultural and the different risk profile and needs of the business divisions and companies across the Liebherr group
- Develop and maintain key risk and performance indicators dashboards and reporting mechanisms for the SETA product and services with a focus on enabling cultural transformation and enhancing human resilience in information security across the Liebherr group divisions and companies
- Partner with stakeholders in the group division and companies including information security IT HR Internal Communications and other Business Units for adoption of the SETA product and services
- Bachelors / Masters in Cybersecurity Computer Science or related field
- 4 years of experience in a security education training and awareness
- Following certificates are preferred;
SSAP (Security Awareness and Culture Professional) CCAP (Certified Cyber Security Awareness Professional) CAPC (Cyber Security Awareness Professional Certification) CISSP (Certified Information Systems Security Professional) - Strong verbal and written communication skills across multicultural environments
- Experience in Instructional design and adult learning principles behavioral science or change management understanding and familiarity with cybersecurity principles and threats
- Understand and can deliver work with cultural sensitivity and adaptability in communications design and awareness training content that resonates across diverse audiences collaborate with empathy and openness encourage inclusiveness creativity and a have a learner-centric approach
- Highly desirable: experience in product ownership and service delivery using SAFe (Scaled Agile Framework) or similar agile methodologies
Our commitment to you : your benefits
As an internationally successful family business the Liebherr Group offers you a secure job a unique variety of tasks and exciting development opportunities. Become part of our strong team today and get to know the Liebherr Group as a reliable partner. Profit from these benefits :
- Attractive salary and social benefits
- Flexible and hybrid working
- Freedom for creative work
- Safe and secure workplace
- Individual development and training opportunities
- Meal voucher
- Life and accident insurance
- Exclusive offer for a premium private health insurance package
- Bonus payments for Christmas and holidays based on the collective agreement
Please only use the online application option.
Please note that we do not accept applications via recruitment agencies for this position.
Have we awoken your interest Then we look forward to receiving your online application. If you have any questions please contact Ivana Kiesewetter.
One Passion. Many Opportunities.
The companyLiebherr is a family-run technology company that is not only one of the largest construction machinery manufacturers in the world but also offers high-quality user-oriented products and services in many other Group employs nearly 5000 people in more than 140 companies on all continents.
Location
Liebherr IT Shared Service Centre Ibrica S.L.
Madrid
Spain (ES)
Contact
Ivana Kiesewetter
Not translated in selected language
Required Experience :
IC
Key SkillsIT Experience,Splunk,IDS,Cybersecurity,FIPS,PCI,NIST Standards,Information Security,Encryption,FISMA,RMF,Siem
Employment Type : Full-Time
Experience : years
Vacancy : 1
#J-18808-LjbffrCyber Security Analyst
Hoy
Trabajo visto
Descripción Del Trabajo
Job Title: SOC Analyst – Level 2 & Level 3
Location: Madrid, Spain (Hybrid/On-site options available)
Job Type: Full-time
Language: English (Spanish is a plus)
Start Date: ASAP
About the Role
We are seeking experienced and motivated SOC Level 2 and Level 3 Analysts to join our growing Security Operations Center in Madrid. You will play a key role in monitoring, detecting, investigating, and responding to cybersecurity threats and incidents across our global infrastructure.
Key Responsibilities
SOC Analyst – Level 2:
- Monitor security alerts and logs using SIEM tools (e.G., Splunk, QRadar, Sentinel).
- Perform initial triage and investigation of security incidents.
- Escalate complex threats to Level 3 analysts with detailed context and recommendations.
- Analyze malware, phishing, and intrusion attempts to assess impact.
- Create and update incident tickets with findings and actions taken.
- Support vulnerability management and threat hunting activities.
- Collaborate with IT, infrastructure, and application teams on security-related events.
SOC Analyst – Level 3:
- Lead incident response efforts, including deep-dive forensic investigations.
- Develop and fine-tune detection rules, use cases, and playbooks.
- Perform threat intelligence correlation and attribution analysis.
- Support red team/blue team exercises and post-incident reviews.
- Mentor and support Level 1 and Level 2 SOC analysts.
- Collaborate with security engineering to implement security tools and improve SIEM/SOAR capabilities.
- Deliver threat briefings and incident reports to internal stakeholders.
Required Qualifications & Skills
For Level 2:
- 2–4 years of experience in a SOC, cybersecurity, or IT security role.
- Strong knowledge of SIEM platforms and log analysis.
- Good understanding of TCP/IP, networking protocols, firewalls, and endpoint protection.
- Familiarity with common threat vectors (malware, phishing, brute force, etc.).
- Certifications such as CompTIA Security+, CySA+, or CEH are a plus.
- Fluent in English;
Spanish is an advantage.
For Level 3:
- 4–7+ years of experience in cybersecurity operations or threat detection & response.
- Expertise in SIEM, SOAR, EDR tools, and forensic analysis.
- Strong scripting skills (Python, PowerShell, etc.) for automation.
- Hands-on experience with incident response and threat intelligence.
- Relevant certifications such as GCIH, GCIA, OSCP, or CISSP .
- Strong communication and leadership skills.
Security Analyst Tier 1
Hoy
Trabajo visto
Descripción Del Trabajo
PLEASE SUBMIT YOUR CV IN ENGLISH.
Stimulating. Motivating. Challenging.
Leveraging its long-standing expertise in securing digital content as well as fighting piracy, Kudelski Security, a division of the Kudelski Group, is a provider of cybersecurity solutions and services focused on protecting data, processes and systems for companies and organizations around the world, safeguarding their assets at a time of increasingly remote communications.
Location : Madrid, Spain
PLEASE SUBMIT YOUR CV IN ENGLISH.
Mission
Managed Security Services (MDR) is a modern way to monitor the systems and networks of customers such as industry, powerplants, administrations and financial services.
The Security Analyst Tier 1 (T1) is responsible for supporting and managing the tools, systems, and technology provided to clients of Kudelski’s MDR business globally.
Your aim is to play an active role in helping Kudelski Security to ultimately make our customer’s businesses more secure.
PLEASE SUBMIT YOUR CV IN ENGLISH.
Responsabilities
- Perform security incident triage at 1st level
- Work 24/7 in shifts (mornings, evenings, nights)
- Investigate security incidents
- Analyze and respond to security Incidents
- Contribute to complex cases handling
- Manage customer communication on security incidents
- Security device management
- Configure and manage Firewall (FW), Intrusion Detection Systems (IDS), Internal Vulnerability Scanners (IVS), Security Information and Event Management (SIEM)
PLEASE SUBMIT YOUR CV IN ENGLISH.
Profile
- Fluent in both English and Spanish
- A great team player who is willing to share, to help and to actively participate in different events
- Proactive, can bring some ideas to improve our tools or services
PLEASE SUBMIT YOUR CV IN ENGLISH.