···
Log in / Register
Cybersecurity Engineer
Negotiable Salary
Indeed
Full-time
Onsite
No experience limit
No degree limit
C. Reino de Aragón, 9, 29601 Marbella, Málaga, Spain
Favourites
Share
Some content was automatically translatedView Original
Description

**Description:** ---------------- We are offering a **Cybersecurity Engineer** position at **Fuerte Group,** in Marbella, Málaga. You will be responsible for protecting the organization's technological infrastructure by designing, implementing, and maintaining security controls and solutions. The goal is to prevent attacks, detect threats, ensure operational continuity of critical systems, and support incident response. **You will gain access to multiple benefits** You will work at Fuerte Group, a large family of top-level professionals with nearly seven decades in the hotel industry who have grown into differentiated brands, especially in southern Spain. Competitive salary policy. Unique working environment, excellent atmosphere surrounded by outstanding professionals. Development opportunities, career plans so we can grow together. Continuous training: we invest in and promote your talent. Special focus on improving your language skills. **Your day-to-day will sound like this...** 1\. Security Architecture and Operations * Design, implement, and optimize security architecture across networks, servers, applications, and cloud environments. * Administer and maintain protection tools such as firewalls, EDR/XDR, IDS/IPS, WAF, SIEM, and authentication systems. * Execute configuration validations (hardening) and technical reviews to ensure alignment with best practices. 2\. Monitoring, Detection, and Analysis * Continuously monitor infrastructure, review logs, and analyze events to identify anomalous or suspicious activities. * Conduct periodic analyses, security tests, maturity assessments, and internal/external penetration testing. * Supervise the use of corporate applications to prevent abuse or data leaks. 3\. Vulnerability and Risk Management * Perform vulnerability scans, assess risks, prioritize findings, and coordinate remediation with responsible teams. * Protect the organization’s critical assets through preventive and corrective controls. 4\. Incident Response * Lead and support responses to security incidents by carrying out containment actions, forensic analysis, eradication, and recovery to minimize impact and downtime. 5\. Compliance, Governance, and Documentation * Apply and ensure compliance with policies, standards, and security frameworks such as ISO 27001, NIST, and CIS Controls. * Ensure compliance with internal and external regulations related to security and data protection. * Periodically review confidentiality agreements signed with suppliers and ensure proper handling of sensitive information. * Develop and maintain security policies, processes, procedures, and controls. 6\. Data Loss Prevention (DLP) Configuration: * Define and adjust DLP policies that identify sensitive data (such as credit card numbers or personal health information) and prevent it from being transferred, printed, or uploaded to insecure locations. * Monitor and analyze alerts generated by DLP systems to investigate potential incidents. 7\. Backup and Disaster Recovery (DRP): * Ensure that backup procedures for critical data are successfully executed, encrypted, and can be effectively restored to guarantee data availability after an incident. 8\. Identity, Access, and License Management * Assign and manage access permissions according to role-based permission profiles and operational needs. * Manage access in platforms such as Google Drive and other corporate tools following the principle of least privilege. * Maintain and update permission and information access records based on employee roles and responsibilities. * Manage licenses for office tools to avoid duplication or misuse. 9\. Support and Training * Provide technical advice to IT teams and projects requiring implementation of security controls. * Promote good cybersecurity practices through training, documentation, and recommendations **Requirements:** --------------- **You are ideal for this position if you have...** Bachelor's degree in Cybersecurity Computer Engineering, Computer Engineering, or Technical Computer Engineering. Postgraduate education or specialization in Tools and Techniques for Specification, Development, Production, and Maintenance of Software is desirable. Minimum of 2 years of professional experience in a functional Cybersecurity role or similar. English B2 level. Proficiency with IT tools: CASB such as Netskope Data Access Governance (DAG) Privacy Management Security Awareness and Defensive Social Engineering using tools like Proofpoint Next-Generation Firewalls (NGFW) Secure Network Architecture: DMZ, network segmentation, VPNs (IPsec/SSL), Zero Trust. Protocols: In-depth knowledge of TCP/IP, DNS, HTTP/S, SSH, and traffic analysis (Wireshark). Vulnerability Scanning: Experience with tools such as Tenable Nessus, Qualys, or OpenVAS. Ethical Hacking: Penetration testing (Pentesting) including black-box, gray-box, and white-box techniques. Programming language proficiency Code Version Control Tools (GIT) Knowledge of ticketing systems Advanced Excel and SQL database skills Understanding of data storage and web architecture Proficiency in LAN and WAN networks. Basic administration of Microsoft and Linux operating systems Apply now and join the Fuerte Group universe. Share this opportunity with your contacts. Discover more openings and learn about Fuerte Group Hotels at talent.fuerte\-group.com

Source:  indeed View original post
David Muñoz
Indeed · HR

Company

Indeed
Cookie
Cookie Settings
Our Apps
Download
Download on the
APP Store
Download
Get it on
Google Play
© 2025 Servanan International Pte. Ltd.