Cybersecurity Engineer

Location CO-Bogotá | CO-Barranquilla
Posted Date 3 days ago(3/12/2026 1:19 PM)
Job ID
2026-4500
# Positions
1
Category
ITO

Job Summary

The Cybersecurity Engineer is an expert cybersecurity professional tasked with managing and supporting complex client operating system environments. This role ensures high levels of system availability and performance while incorporating threat intelligence to identify emerging risks and adversary activity. The Cybersecurity Engineer plays a critical role in strengthening the organization’s cybersecurity posture through advanced threat detection, threat intelligence analysis, incident response, and security infrastructure management.

Responsibilities

Experience:

  • Minimum of 3+ years of experience in cybersecurity, with at least 2 years in Threat Intelligence role.

  • Demonstrated expertise in threat intelligence analysis, including adversary tracking, IOC analysis, and threat campaign investigation.

  • Experience in threat hunting, intelligence-driven detection development, and applying threat intelligence to strengthen security controls.

Education:

  • Computer Science, Engineering, IT bachelor's degree or equivalent working experience.

  • Have at least one of the following certifications: GIAC (GCTI, GCIA, or GCIH), Microsoft (AZ-500, SC-200 or SC-300), AWS (Security Specialty), EC-Council (Ethical Hacker, Network Defense) or similar certification.

  • Additional certifications related to Threat Intelligence or Incident Response are advantageous.

Technical Skills:

  • Knowledge of ITIL Framework: In-depth understanding and practical application in infrastructure and security operations.

  • Desirable experience with Threat Intelligence Platforms such as OpenCTI, MISP, ThreatConnect, or Anomali.
  • Knowledge in infrastructure operations management.

  • Knowledge in patching & remediation cycles.

  • Knowledge of Active Directory services (on premise & Azure).

  • Proven experience in cybersecurity engineering with strong understanding of threat intelligence processes, adversary tactics, and evolving threat landscape.

  • Experience with security tools such as firewalls, intrusion detection/prevention systems, endpoint protection platforms, SIEM solutions, and threat intelligence platforms.

  • Knowledge of Microsoft Office 365 & Microsoft Security applications.

  • Knowledge of Security Incident Management.

  • Microsoft Security Associate Certified (one of the following: SC200, SC300, or AZ500).

  • Knowledge of IT Security Auditing.

  • Strong analytical skills for correlating threat intelligence with operational security data.

  • Knowledge of NIST 800-53, CIS Controls, ISO-27000, PCI DSS and GDPR.

Required Technical Proficiencies:

  • Threat Intelligence Analysis: Strong capability to collect, enrich, correlate, and operationalize threat intelligence from multiple sources.

  • Ability to map security incidents, intelligence findings, and adversary tactics, techniques, and procedures (TTPs) to the MITRE ATT&CK matrix.

  • Monitoring & Analysis Tools: Advanced proficiency with SIEM platforms (e.g., MS Sentinel), EDR solutions, and threat intelligence platforms.

  • Incident Response Techniques: Expertise in incident handling, containment, eradication, and recovery techniques.

Language Skills:

  • English – Spanish Language (Oral and writing 85 % or higher), (C1+ or above).

Skills and Experience

  • Collect, analyze, and operationalize threat intelligence from internal telemetry, OSINT, and commercial intelligence feeds.

  • Identify adversary tactics, techniques, and procedures (TTPs) and translate intelligence into actionable detection use cases.

  • Manage and integrate threat intelligence indicators (IOCs) into SIEM, EDR, and security monitoring platforms.

  • Conduct proactive threat hunting activities based on threat intelligence and emerging adversary campaigns.

  • Collaborate with SOC and incident response teams to enrich investigations with intelligence context and adversary attribution.

  • Support and monitor endpoint, network, and cloud security platforms (EDR, NDR, firewalls, email security, identity platforms, SIEM, XDR).

  • Maintain and optimize threat intelligence platforms and integrations (e.g., TIP, IOC feeds, automation workflows).

  • Assist with vulnerability analysis by correlating threat intelligence with emerging exploitation trends and threat actor activity.

  • Produce threat intelligence reports, briefings, and strategic assessments for internal stakeholders and clients.

  • Communicate effectively to identify root causes and provide intelligence-driven recommendations for security improvements.

  • Assist with the design, documentation, and enforcement of threat intelligence processes, procedures, and security policies.

  • Collaborate with IT and security teams to ensure security controls and asset management processes incorporate threat intelligence insights.

  • Participate in an on-call rotation as needed for supporting security monitoring and incident response activities.

#LI-FV1

About Auxis

Auxis prioritizes employee growth and development to help you advance your career. Auxis’ culture empowers you to be your best in the interest of a common team goal. We are constantly striving to improve our culture and environment and have invested in tools to continue to have better visualization of the pulse of our organization.

 

Benefits

  • Health benefits including medical, vision, and dental.
  • Asociacion Solidarista
  • Training and development programs
  • Employee recognition program
  • Paid time off and family-paid leave
  • Paid day off for your birthday!

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed