#R-55288
scale, cloud-native infrastructures.
Who You Are
'3+ year in cybersecurity services
Spanish and English (B2 level or higher)
Advanced Technician Certificate in Multiplatform Application Development
Certifications:
Google SecOps - SOAR Developer, Google SecOps - SOAR Analyst
Full-time 8x5 schedule, hybrid (Madrid) full remote
KEY RESPONSABILITIES:
Operate and optimize Google SecOps platforms, ensuring high-quality detection, response, and monitoring capabilities
Design and maintain custom detection logic using UDM, YARA-L rulesets, and BigQuery analytics
Lead incident investigation and response using Chronicle's investigation workbench and Gemini-driven workflows
Build and automate SOAR playbooks for triage, containment, remediation, and enrichment
Integrate diverse log sources into Google SecOPs (GCP services, endpoints, SaaS applications, on-prem systems)
Conduct threat hunting using BigQuery, threat intelligence, and historical log datasets
Collaborate with SecOps, Cloud, and IT teams to ensure consistent security visibility across hybrid environments
Support forensics and root cause analysis by leveraging Google Cloud-native telemetry
Develop dashboards, reports, and operational KPIs for security leadership and governance
Tune detections, enrich signals, and refine playbooks to reduce false positives and accelerate response
Align security operations with regulatory and compliance requirements relevant to the environment
Drive continuous improvement by evaluating new features in Chronicle, Gemini, and Google Cloud Security Services
CORE REQUIRED COMPETENCIES:
Expert understanding of Google SecOps (Chronicle SIEM, Chronicle SOAR, investigation workbench)
Strong experience with BigQuery for threat detection, analytics, and custom security queries
Knowledge of Gemini for Security (AI-assisted investigation, threat summarization, response acceleration)
Understanding of Google Cloud security architecture, IAM, VPC, SCC (Security Command Center)
Hands-on experience creating detection rules, YARA-L, IOCs, UDM-based queries
Familiarity with log ingestion pipelines (Dataflow, Pub/Sub, Log Router)
Experience in SOAR playbook design, automation, and orchestration for incident response
Knowledge of MITRE ATT&CK, threat hunting methodologies, and incident lifecycle management
Ability to perform forensic analysis leveraging Google Cloud evidence sources (GCS, Cloud Logging, API logs)
Skills in scripting (Python, SQL, bash) for automation and custom tooling
Experience with threat intelligence enrichment, IOC management, and contextual analysis
Strong communication and documentation skills for reporting, runbooks, and knowledge bases
Being You
Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way.
What You Can Expect
With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.
Get Referred!
If you know someone that works at Kyndryl, when asked 'How Did You Hear About Us' during the application process, select 'Employee Referral' and enter your contact's Kyndryl email address.