Responsible for supervising activities related to the operational security of information systems.
Responsibilities include conducting penetration tests, static and dynamic code analysis, and implementing application and infrastructure security controls to strengthen the protection of the client’s information assets.
Monitors potential threats and implements incident response plans to limit organizational impact.
In the event of a security breach, leads forensic investigations, including the collection and analysis of evidence necessary to support corrective actions.
Responsible for the maintenance and continuous optimization of security tools, such as firewalls and intrusion detection and prevention systems, ensuring they are regularly updated.
Collaborates with IT teams and other organizational units to ensure a consistent, proactive, and integrated approach to information security across the client’s environment.
Conduct penetration tests (infrastructure or application) according to the defined scope.
Document vulnerabilities discovered during penetration testing with supporting evidence and recommend corrective measures applicable to the client’s environment.
Conduct forensic investigations in the context of security incidents.
Support the security operations team in implementing security measures to enhance the robustness of controls needed to protect the client’s internet-facing systems and infrastructure.
Requirements
Hold a university degree in computer science, cybersecurity, or a related field, or an equivalency recognized by government standards.
Possess at least one of the following certifications: CISSP, CISA, CISM, CEH, CRISC, ISO/IEC 27001 Lead Implementer, ISO/IEC 27001 Lead Auditor, OSCP, CCSK, ISO 27005 Senior Lead Risk Manager, ISO 27032 Senior Lead Cybersecurity Manager.
Have at least 5 years of experience in operational information security.
Demonstrate hands-on experience implementing innovative security solutions and conducting infrastructure and application penetration tests, performing forensic investigations following security incidents, implementing application security controls such as WAF, CAPTCHA, MFA, and be proficient with cybersecurity tools.
Have participated in 2 large-scale projects involving the hardening of critical systems, involving complex environments with more than 500 users.
Demonstrate experience implementing protection measures for information assets, including the use of encryption solutions, firewalls, and intrusion detection systems.
Have experience operating security software such as SIEM or EDR solutions.
Have contributed to 2 projects in a cloud or hybrid environment as an Operational Security Specialist.
Tech Stack
Cloud
Cyber Security
Benefits
A dynamic, supportive team culture based on trust and collaboration.
A flexible remote work environment.
The opportunity to contribute to large-scale projects in the technology sector.
Real opportunities for initiative, innovation, and professional development.