At ACK3, we take pride in being a leading consultancy in global risk management and strategic intelligence. Founded in 2010 by distinguished veterans of the Spanish Special Forces, our boutique firm has become a benchmark in the field of risk control and intelligence consulting. We specialize in providing fast, tailored solutions to a wide range of clients, including private companies, individuals, and governments worldwide. We are currently looking for a:
SOC Analyst – Cybersecurity Profile (Red Team, Forensics, OSINT, Kali Linux, Python)
At ACK3, a leading consultancy in global risk and strategic intelligence, we are seeking an SOC Analyst with experience in offensive cybersecurity (Red Team), forensic analysis, and strong knowledge of OSINT, Kali Linux, and Python, to strengthen our security operations team.
What is an SOC Analyst with an Offensive Cybersecurity Profile?
An SOC Analyst – Cybersecurity Profile (Red Team, Forensics, OSINT, Kali Linux, Python) is a professional specialized in identifying and exploiting vulnerabilities in an organization’s information systems with the goal of strengthening its security posture. Their main responsibility is to simulate cyberattacks to evaluate the resilience of the technological infrastructure and propose improvements. This role focuses on forensic incident analysis, open-source intelligence gathering (OSINT), and the use of tools such as Kali Linux and programming languages like Python to automate tasks and develop custom scripts. The SOC Analyst works closely with other security teams to ensure effective incident response and maintain the integrity of systems. Their work is essential for anticipating threats and ensuring operational continuity in an increasingly complex digital environment.
Responsibilities
• Conduct penetration tests and attack simulations to identify vulnerabilities
• Analyze and correlate security events using SIEM tools
• Apply OSINT techniques to identify external threats
• Support incident response efforts and implement corrective measures
• Document and report detected incidents and vulnerabilities
Minimum requirements
• Previous experience in cybersecurity roles, especially in SOC environments
• Solid knowledge of Red Team tools and techniques
• Proficiency in OSINT methodologies for information gathering and analysis
• Familiarity with SIEM tools and intrusion detection systems (IDS/IPS)
• Ability to work in a team and under pressure
Preferred qualifications
• Cybersecurity certifications (e.g., CompTIA Security+, CEH, CySA+)
• Experience in digital forensics and incident response
• Scripting skills (Python, Bash) for task automation
• Technical English (reading and writing level)
What we offer
• Integration into a multidisciplinary team in a dynamic environment
• Participation in high-impact international security projects
• Continuous training and professional development opportunities
• Competitive working conditions aligned with experience
Why join ACK3?
• You’ll be part of a company committed to excellence in security and intelligence
• You’ll work on challenging projects that contribute to the protection of critical infrastructures
• You’ll grow your career in an environment that values innovation and professional development
If you have the experience and expertise to detect and mitigate advanced digital threats, we invite you to join ACK3. Contribute from Spain to strengthening our offensive cybersecurity and intelligence capabilities by participating in high-level projects that make a real difference in global security.
Take the initiative towards a distinguished career in risk and intelligence consulting!
Apply now to join our mission at ACK3 and make a tangible impact in the field of global economic intelligence and foresight.