Cyber Threat, Vulnerability and Security Infrastructure Lead - Bilingual English/Spanish

Bogotá, Colombia

Alexandra Lozano Immigration Law PLLC

View all jobs at Alexandra Lozano Immigration Law PLLC

Apply now Apply later

Overview

We are seeking a bilingual, experienced and highly skilled Cyber Threat, Vulnerability and Security Infrastructure Lead to join our dynamic team and take responsibility for managing the organization's security infrastructure, vulnerability management, and threat intelligence & hunting activities. The ideal candidate will possess a deep understanding of security best practices and tools, demonstrate a proactive approach to vulnerability identification and remediation, and have hands-on experience with threat intelligence gathering and threat hunting techniques. This leadership role will involve working with cross-functional teams, collaborating with IT and other departments, and ensuring that security protocols are aligned with business objectives to protect critical assets from emerging cyber threats.

 

This position is 100% remote in Colombia.

Responsibilities

  • Security Infrastructure Management:
      • Lead and manage the design, implementation, operation and maintenance of enterprise security infrastructure.
      • Oversee the deployment and management of security technologies such as CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.
      • Monitor and ensure the availability and operational effectiveness of security controls to protect against internal and external threats.
  • Lead vulnerability management efforts, including regular vulnerability assessments and scanning across all systems and applications. The following types of tests must be planned, scheduled and performed :
    • Static Application Security Testing (SAST)
    • Dynamic Application Security Testing (DAST)
    • Interactive Application Security Testing (IAST)
    • Software Composition Analysis (SCA)
    • Infrastructure Vulnerability Scanning
    • Container Vulnerability Scanning
  • Identify, assess, and prioritize vulnerabilities based on risk and impact, and coordinate the remediation process across relevant teams.
  • Track and report on vulnerability mitigation progress and ensure compliance with internal and external security requirements.
  • Collaborate with development and IT teams to ensure that security best practices are integrated into the Secure software development life cycle (SSDLC) to avoid known vulnerabilities.
  • Threat Intelligence and Threat Hunting:
    • Manage the threat intelligence lifecycle, including the collection, analysis, and dissemination of actionable threat intelligence to proactively identify and mitigate potential cyber threats.
    • Lead threat hunting efforts to actively search for indicators of compromise (IOCs), advanced persistent threats (APTs), and other malicious activity within the organization's networks and systems.
    • Work with internal teams and external vendors to enhance threat intelligence feeds, ensuring they are current and relevant.
    • Identify and provide the latest threat landscape and intelligence findings as input to develop and update incident response playbooks.
    • Provide strategic recommendations to leadership based on emerging threats and security trends.
  • Leadership, Collaboration & Reporting:
  • Identify, design, plan and lead implementation of automation opportunities.
  • Continuous improvement of the processes under your responsibility.
  • Collaborate with cross-functional teams (e.g., IT, development, operations) to ensure alignment of security practices with internal and external security requirements.
  • Lead the evaluation and selection of third-party vendors or tools for threat, vulnerability and security infrastructure management.
  • Provide expert guidance on threat and vulnerability management to all levels of the organization.
  • Provide regular status reports and metrics on threat, vulnerability and security infrastructure management to senior leadership, offering actionable insights and recommendations for improvements.

Qualifications

    • Bilingual (English - Spanish) B2/C1.
    • Education:
      • Bachelor’s degree in computer science. Post-graduate degree in cyber/information security is a plus.
    • Certifications:
      • CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) preferred.
      • CEH and/or technical certifications related to threat intelligence, threat hunting and/or vulnerability management are highly desirable.
    • Experience:
      • 7+ years of experience in cybersecurity, with at least 3 years in a threat intelligence, threat hunting and vulnerability management leadership role.
      • Proven experience in security infrastructure management, security technologies (e.g., CSPM, firewalls, FWaaS, IPS, EDR/NDR/XDR, SWG, ZTNA, CASB, WAF/WAAP, SIEM systems, Microsoft Entra Privileged Identity Management and encryption solutions, among others.)
      • Proven experience in vulnerability management, risk assessment and threat intelligence.
      • Hands-on experience in threat hunting, leveraging tools such as ELK stack, Splunk, and similar platforms.
      • Experience with cloud security is a plus (Azure, AWS, Google Cloud, etc.).
  • Skills and Competencies:
    • Strong knowledge of network services and protocols, security protocols and technologies.
    • Strong knowledge of vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and patch management platforms.
    • Strong knowledge of threat intelligence platforms and frameworks (e.g., MISP, STIX, TAXII, MITRE ATT&CK).
  • Communication and presentation skills, with the ability to engage stakeholders.
  • Ability to stay current and adapt quickly to new regulations, emerging security trends, tools, and technologies.
  • Strong problem-solving and analytical skills, with the ability to manage complex security challenges.

 

#IN-ALIL

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Application security Automation AWS Azure CASB CEH CISA CISM CISSP Cloud Compliance Computer Science CSPM DAST EDR ELK Encryption Firewalls GCP IAST Incident response IPS MISP MITRE ATT&CK Nessus OpenVAS Qualys Risk assessment SAST SDLC SIEM Splunk SSDLC Threat intelligence Vulnerabilities Vulnerability management XDR ZTNA

Perks/benefits: Career development

Regions: Remote/Anywhere South America
Country: Colombia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.