




Job Summary: We are seeking a cybersecurity specialist with experience in complex enterprise environments to assess, strengthen, and monitor the comprehensive security of our technological infrastructure. Key Highlights: 1. Proven experience in complex enterprise environments 2. Responsibility for infrastructure assessment and hardening 3. Ability to think like an attacker and prioritize risks **Cybersecurity Specialist Position (On-site)** We seek to hire a cybersecurity specialist with proven experience in complex enterprise environments, responsible for assessing, strengthening, and monitoring the comprehensive security of our technological infrastructure, applications, and authentication systems. The role is on-site and requires direct interaction with technical teams, operations, and leadership. **Scope of the Role** The specialist will have direct responsibility for: * Infrastructure assessment and hardening (cloud, on\-premise, and hybrid) * Security architecture review * Identity and access management * Incident detection and response * Application security * Offensive security testing (penetration testing) * Continuous monitoring and improvement of controls **Key Responsibilities** * Conduct security audits of: * servers * networks * databases * cloud services (Azure, AWS, etc.) * Assess and implement controls for: * authentication (MFA, SSO, OAuth, etc.) * authorization (roles, RBAC, least privilege) * Design and validate security schemes for: * APIs * web applications * external integrations * Execute security testing: * application penetration testing * vulnerability analysis * network intrusion testing * Implement and manage tools for: * SIEM * intrusion detection (IDS/IPS) * EDR/XDR * Monitor security events and respond to incidents: * log analysis * anomaly investigation * containment and remediation * Identify real attack vectors: * unauthorized access * data exposure * misconfigurations * Establish security policies and standards: * compliance (ISO 27001, NIST, etc.) * operational best practices **Technical Requirements** * Solid experience in: * Azure security (key requirement) * networking and protocols (TCP/IP, VPN, firewalls) * Linux and Windows Server systems * Knowledge of: * identity management (Azure AD / Entra ID) * Zero Trust * endpoint protection * Practical experience in: * penetration testing (OWASP Top 10\) * tools such as: * Burp Suite * Metasploit * Nessus / OpenVAS * Wireshark * Handling of: * centralized logs * SIEM (e.g., Sentinel, Splunk) * Experience securing: * APIs (tokens, scopes, rate limiting) * modern authentication (JWT, OAuth2\) **Desired Profile** * Ability to think like an attacker (not just checklist-based) * Experience identifying real-world issues, not only theoretical ones * Practical approach: prioritize risks that truly impact business * Ability to explain technical risks at executive level **Expected Deliverables** * Current security posture report * Prioritized list of vulnerabilities * Remediation plan with impact vs. effort analysis * Implementation of critical controls * Proposal for future security architecture **Operational Details** * Work modality: On-site * Location: Santiago de Surco * Type: full\-time Workplace: On-site employment


