ARCHIVED
This job listing has been archived and is no longer accepting applications.
MisuJob - AI Job Search Platform MisuJob

Senior / Lead Defensive Security Engineer

Confidential

Mexico City, Mexico City Hybrid permanent

Posted: February 10, 2026

Interested in this position?

Create a free account to apply with AI-powered matching

Job Description

About the Role

We're looking for a Senior or Lead Security Engineer focused on Defensive Security (Blue Team / SOC) to own our security detection, monitoring, and incident response capabilities across infrastructure, cloud environments, and corporate systems.

This role focuses on threat detection engineering, incident response, threat hunting, and security monitoring, with direct responsibility for supporting ISO/IEC 27001 and PCI DSS requirements for logging, monitoring, and incident management.

At E2, you independently execute detection and incident response activities, build detection content, and operate SIEM/SOAR platforms.
At E3, you act as a technical leader for Blue Team and SOC capabilities, setting detection strategy, defining response metrics, and mentoring others on incident response and threat hunting.

What You'll Do

Own detection & response posture — Design, implement, and continuously improve detection and monitoring capabilities across cloud, endpoints, and networks

Lead incident response — Handle security incidents end-to-end: triage, containment, eradication, recovery, forensics, and post-incident reviews

Build detection engineering capabilities — Create, tune, and maintain SIEM correlation rules, alerts, and automated response workflows (SOAR)

Threat hunting & intelligence — Perform advanced threat hunting and operationalize threat intelligence platforms and external feeds

Develop detection content — Maintain detection artifacts, including YARA rules, signatures, and behavioral detections aligned with MITRE ATT&CK

Define security metrics — Track and improve SOC and IR KPIs (MTTD, MTTR, alert fidelity, false positives) and build dashboards for visibility

Support compliance — Review, validate, and provide evidence for ISO/IEC 27001 and PCI DSS controls related to logging, monitoring, and incident response

Improve visibility — Ensure proper logging, telemetry, and signal quality across AWS, operating systems, and network layers

Post-incident improvement — Lead post-mortems and continuously improve detection, response playbooks, and procedures

Mentor and guide — Coach engineers and security team members on incident response, detection engineering, and threat hunting best practices

Detect and respond to exploitation attempts related to common web application risks (OWASP Top 10) using logs, alerts, and incident analysis

What We're Looking For

Technical

3+ years in Blue Team, SOC, or Incident Response roles (5+ years for E3)

Strong experience with SIEM and SOAR tools (rule creation, tuning, automation)

Proven experience in incident response operations and security monitoring

Experience with threat intelligence platforms and threat feeds, and their use in detection and response

Strong experience performing advanced threat hunting techniques

Hands-on experience creating and maintaining detection content, including YARA rules

Ability to define and measure security and incident response metrics

Experience building security dashboards for SOC and IR visibility

Solid understanding of logging pipelines, telemetry, and event analysis

Familiarity with MITRE ATT&CK and attacker techniques

Experience supporting PCI DSS and ISO/IEC 27001 controls related to monitoring, logging, and incident response

Cloud security fundamentals (AWS preferred: CloudTrail, GuardDuty, Security Hub, IAM logging)

Scripting skills for automation (Python, Bash)

AI Fluency

Uses AI tools for log analysis, threat detection, and incident response automation

Understands AI-related security risks (data leakage, model abuse, misuse of AI tools)

Applies AI to accelerate threat hunting and incident analysis

Stays current on emerging AI security threats relevant to SOC operations

Leadership & Communication

Experience communicating incidents, risks, and metrics to technical and non-technical stakeholders

Comfortable interacting with auditors during ISO 27001 and PCI DSS assessments

Strong documentation skills for procedures, playbooks, and incident reports

Fluent in Spanish; working knowledge of English for vendors and documentation

Mindset

Strong defensive security mindset: prevention, detection, and response first

Proactive about identifying threats before they escalate into incidents

Calm and methodical under pressure during security incidents

Strong ownership—you see incidents and improvements through to completion

Curious about fintech-specific threats, fraud patterns, and regulatory impact

Nice to Have

Industry-recognized Blue Team / SOC certifications:

GIAC (GCED, GCIA, GCIH)

Blue Team Level 1 / Level 2 (BTL1 / BTL2)

SC-200 (Microsoft Security Operations Analyst)

CISSP or CCSP

Experience acting as an incident commander during major incidents

Experience in financial services or regulated environments

Our Stack

Cloud: AWS (CloudTrail, GuardDuty, Security Hub, IAM)
Infrastructure: Pulumi, Terraform, Datadog, Jenkins
Endpoint: Jamf, Microsoft Intune
Identity: SSO/SCIM, Active Directory
Compliance: PCI DSS, ISO/IEC 27001

Why Aplazo

Our mission is to empower financial access and opportunity across Latin America through fair, simple, and transparent solutions. Our tech vision is to be the most beloved and innovative tech organization in Latin America.

We're a Series B fintech growing fast—security is critical to our customers' trust and our ability to operate. You'll own core Blue Team and incident response capabilities for a platform that handles millions of financial transactions.

Why Apply Through MisuJob?

AI-Powered Job Matching: MisuJob uses advanced artificial intelligence to analyze your skills, experience, and career goals. Our matching algorithm compares your profile against thousands of job requirements to find positions where you have the highest chance of success. This saves you hours of manual job searching and ensures you only see relevant opportunities.

One-Click Applications: Once you create your profile, applying to jobs is effortless. Your resume and cover letter are automatically tailored to highlight the most relevant experience for each position. You can apply to multiple jobs in minutes, not hours.

Career Intelligence: Beyond job matching, MisuJob provides valuable career insights. See how your skills compare to market demands, identify skill gaps to address, and understand salary benchmarks for your experience level. Make data-driven decisions about your career path.

Frequently Asked Questions

How do I apply for this position?

Click the "Register to Apply" button above to create a free MisuJob account. Once registered, you can apply with one click and track your application status in your dashboard.

Is MisuJob free for job seekers?

Yes, MisuJob is completely free for job seekers. Create your profile, get matched with jobs, and apply without any cost. We help you find your dream job without any hidden fees.

How does AI matching work?

Our AI analyzes your resume, skills, and experience to understand your professional profile. It then compares this against job requirements using natural language processing to calculate a match percentage. Higher matches mean better fit for the role.

Can I apply to jobs in other countries?

Absolutely. MisuJob features jobs from companies worldwide, including remote positions. Filter by location or look for remote opportunities to find jobs that match your preferences.

Ready to Apply?

Join thousands of job seekers using MisuJob's AI to find and apply to their dream jobs automatically.

Register to Apply