At ACK3 , we take pride in being a leading consultancy in global risk management and strategic intelligence. Founded in 2010 by distinguished veterans of the Spanish Special Forces , our boutique firm has become a benchmark in the field of risk control and intelligence consulting. We specialize in providing fast, tailored solutions to a wide range of clients, including private companies, individuals, and governments worldwide. We are currently looking for a :
SOC Analyst – Cybersecurity Profile (Red Team, Forensics, OSINT, Kali Linux, Python) At ACK3 , a leading consultancy in global risk and strategic intelligence, we are seeking an SOC Analyst with experience in offensive cybersecurity (Red Team), forensic analysis, and strong knowledge of OSINT, Kali Linux, and Python, to strengthen our security operations team.
What is an SOC Analyst with an Offensive Cybersecurity Profile? An SOC Analyst – Cybersecurity Profile (Red Team, Forensics, OSINT, Kali Linux, Python) is a professional specialized in identifying and exploiting vulnerabilities in an organization’s information systems with the goal of strengthening its security posture. Their main responsibility is to simulate cyberattacks to evaluate the resilience of the technological infrastructure and propose improvements. This role focuses on forensic incident analysis, open-source intelligence gathering (OSINT), and the use of tools such as Kali Linux and programming languages like Python to automate tasks and develop custom scripts. The SOC Analyst works closely with other security teams to ensure effective incident response and maintain the integrity of systems. Their work is essential for anticipating threats and ensuring operational continuity in an increasingly complex digital environment.
Responsibilities Conduct penetration tests and attack simulations to identify vulnerabilities
Analyze and correlate security events using SIEM tools
Apply OSINT techniques to identify external threats
Support incident response efforts and implement corrective measures
Document and report detected incidents and vulnerabilities
Minimum requirements Previous experience in cybersecurity roles, especially in SOC environments
Solid knowledge of Red Team tools and techniques
Proficiency in OSINT methodologies for information gathering and analysis
Familiarity with SIEM tools and intrusion detection systems (IDS / IPS)
Ability to work in a team and under pressure
Preferred qualifications Cybersecurity certifications (e.g., CompTIA Security+ , CEH , CySA+ )
Experience in digital forensics and incident response
Scripting skills (Python, Bash) for task automation
Technical English (reading and writing level)
What we offer Integration into a multidisciplinary team in a dynamic environment
Participation in high-impact international security projects
Continuous training and professional development opportunities
Competitive working conditions aligned with experience
Why join ACK3? You’ll be part of a company committed to excellence in security and intelligence
You’ll work on challenging projects that contribute to the protection of critical infrastructures
You’ll grow your career in an environment that values innovation and professional development
If you have the experience and expertise to detect and mitigate advanced digital threats, we invite you to join ACK3. Contribute from Spain to strengthening our offensive cybersecurity and intelligence capabilities by participating in high-level projects that make a real difference in global security.
Take the initiative towards a distinguished career in risk and intelligence consulting! Apply now to join our mission at ACK3 and make a tangible impact in the field of global economic intelligence and foresight.
#J-18808-Ljbffr
Cybersecurity Analyst • Madrid, Madrid, SPAIN