Descripción de la oferta
We’re hiring: Simulation & Detection Engineer (BAS / SIEM / EDR / XDR) Hack in Hire is recruiting for a cybersecurity consulting and services company (Barcelona-based, international scope) that has been protecting organizations for years across incident response, digital forensics, managed services, threat intelligence, and Red & Purple Team engagements. The team is growing its Security Control Validation + Detection Engineering capability and is looking for someone who enjoys turning realistic adversary simulations into high‑signal detections and clear improvement plans for customers. About the role As a Simulation & Detection Engineer, you’ll combine offensive and defensive thinking to evaluate and improve customer security controls. You’ll operate and refine Breach & Attack Simulation (BAS) tooling, design attack scenarios mapped to MITRE ATT&CK, analyze simulation outcomes, and translate gaps into detection rules, mitigations, and actionable reporting for technical and executive stakeholders. What you’ll do Operate, tune, and administer BAS / attack simulation tools to validate security controls in realistic scenarios Select and replicate adversary tactics and techniques aligned with MITRE ATT&CK Analyze simulation results to identify detection/control gaps and improvement opportunities Define threat detection and mitigation strategies based on findings Design, develop, and fine‑tune detection rules across SIEM / EDR / XDR platforms Configure and manage lab environments to execute attack simulations safely and repeatably Automate evaluation and reporting workflows by building scripts/tools (e.g., Python, PowerShell, Bash) Produce technical and executive reports communicating risks, evidence, and recommendations clearly to customers What we’re looking for Bachelor’s degree in Engineering / Cybersecurity (or equivalent proven professional experience) 2–3 years of experience in one or more of the following: Adversary simulation / BAS platforms (e.g., AttackIQ, Caldera, Cymulate, Pentera, SafeBreach, or similar) Detection engineering / SOC work creating and optimizing alerts in SIEM and/or EDR Strong understanding of Windows telemetry/logs and events for proactive detection Solid grasp of adversary TTPs mapped to MITRE ATT&CK Experience with SIEM/EDR tools such as CrowdStrike, Cortex, Splunk, Elastic (ELK), LogRhythm, Microsoft Sentinel, QRadar, Chronicle, Wazuh (or comparable) Scripting skills (Bash, Python, PowerShell) for automation and tooling Systems administration knowledge across Windows and UNIX/Linux Solid networking fundamentals (TCP/IP, DHCP, DNS, core protocols) “Purple mindset”: think like an adversary while strengthening defenses Ability to communicate clearly in English in technical and international environments Certifications and/or a Master’s degree in cybersecurity are a plus What’s offered Salary range: €28k–€38k (depending on experience and capability) Barcelona or remote (telework) flexibility, with access to comfortable offices Join an international, young, dynamic team with a great working environment Close collaboration with Red Team and Blue Team, with exposure to multiple detection technologies and real‑world scenarios Continuous training (internal + external), including certifications and annual conference attendance Personalized career development plan aligned with your growth Work‑life balance support + summer intensive schedule Flexible compensation plan (meals, transport, childcare, training) Private health insurance Interested? Apply via LinkedIn or submit your CV via hackinhire.com. #J-18808-Ljbffr