Threat Detection & Intelligence Specialist (L2)
Delta Protect
At Delta Protect we make Cybersecurity and Compliance accessible, automated and actionable for companies throughout Latin America. We accompany our clients in certifications such as ISO 27001, PCI DSS, SOC 2, HIPAA, integrating Pentesting, Threat Detection, Cyber Intelligence and 24/7 Security Operations with a technical, human and business approach.
From Micro-enterprises, to unicorns 🦄 we believe that Cybersecurity and Compliance is for everyone.
Our Impact
- +300 companies trust us 🔒.
- +500 successful projects delivered ⚙️
- +15K endpoints monitored in real time 📡
- +1K critical vulnerabilities detected and corrected 💪
- +1M of exposed data detected on the dark web 👁️
- +7 countries with protected customers 🌎
- +6 years transforming cybersecurity in LATAM 🚀.
Why join Delta?
Cyberattacks have increased by more than 400% since the 🦠 pandemic, and companies are the main target. Our purpose is clear: to protect LATAM's business fabric from the next cyber pandemic... and we want you to be part of the team building this defense. 🌎
What do we offer you?
- 🧠 High Performance Team: you will learn more in 3 months than in 1 year elsewhere .
- 1200 USD for personal development
- 🩺 Major and minor medical insurance
- 💻 Hardware included
- 🚗 Transportation with Uber for face-to-face activities.
- 🏝️ Flexible, results-oriented vacations
- 🏡 Hybrid work
- ✅ Culture in pursuit of excellence, results-oriented.
How does the process work?
- Apply in our application form 📩
- If your profile fits, you'll get an initial screening call 🤝
- We will send you a technical or practical challenge ⚙️
- You will present your solution to the area leader in a video call💡
- You will have a session with the Head of People to assess cultural fit 🧩
- Finally, you will talk to the founders of Delta Protect 🚀.
🎯 Role Mission
This role is key to strengthening our proactive detection capabilities, generating actionable intelligence from the analysis of TTPs, IOCs and data from multiple internal and external sources. You will collaborate with the engineering, architecture and incident response team to protect our customers from sophisticated threats in cloud and on-premise environments.
🧠 Main Responsibilities
- Analyze alerts and incidents escalated by L1 analysts to determine impact, criticality and containment actions.
- Execute threat hunting campaigns based on hypotheses, adversarial behavior and models such as MITRE ATT&CK.
- Correlate events in SIEM tools to identify anomalous or malicious patterns.
- Collect, validate and contextualize threat intelligence from OSINT sources, commercial and internal feeds.
- Prepare tactical and strategic reports on relevant threats.
- Participate in incident response exercises, post-mortem analysis and feedback to the SOC.
- Collaborate with the engineering team to enforce security controls in cloud (AWS, Azure, GCP) and on-premise environments.
- Support continuous improvement of the detection ecosystem: correlation rules, use cases, dashboards.
🛠️ Technical Skills and Tools
Threat Hunting
- Detection based on TTPs and adversarial behavior.
- Development of hypothesis and advanced queries (SIEM).
Threat Intelligence
- Use of platforms such as MISP, Anomali, VirusTotal, Recorded Future.
- Threat mapping with MITRE ATT&CK, STIX/TAXII.
- Reporting and alert enrichment.
SIEM (advanced level):
- Splunk, IBM QRadar, Microsoft Sentinel, Google Chronicle.
EDR/XDR:
- SentinelOne, CrowdStrike, Microsoft Defender ATP.
Cloud Security:
- Monitoring of logs and configurations in AWS (CloudTrail, GuardDuty), Azure, GCP.
Scripting / Automation (basic/intermediate level):
- Python, PowerShell, Regex, REST APIs.
🧬 Profile Required
- 2- 3 years of SOC experience as L2.
- Technical proficiency in SIEM and Threat Intelligence tools.
- Real-world experience in hunting, incident response and threat analysis.
- Analytical skills, critical thinking and results orientation.
- Desirable: experience in use case creation and analysis flow automation.
- Excellent documentation, collaboration and technical communication skills.
📜 D esired Certifications
- CompTIA CySA+
- GIAC Cyber Threat Intelligence (GCTI)
- GIAC Threat Hunting (GCTH)
- Microsoft SC-200
- SANS SEC504 / SEC511 (optional)