We're hiring: Simulation & Detection Engineer (BAS / SIEM / EDR / XDR)Hack in Hire is recruiting for a cybersecurity consulting and services company (Barcelona-based, international scope) that has been protecting organizations for years across incident response, digital forensics, managed services, threat intelligence, and Red & Purple Team engagements. The team is growing its Security Control Validation + Detection Engineering capability and is looking for someone who enjoys turning realistic adversary simulations into high-signal detections and clear improvement plans for customers.About the role
Obtenga más información sobre este puesto leyendo los detalles a continuación y luego envíe su solicitud para ser considerado.
As a Simulation & Detection Engineer, you'll combine offensive and defensive thinking to evaluate and improve customer security controls. You'll operate and refine Breach & Attack Simulation (BAS) tooling, design attack scenarios mapped to MITRE ATT&CK, analyze simulation outcomes, and translate gaps into detection rules, mitigations, and actionable reporting for technical and executive stakeholders.
What you'll doOperate, tune, and administer BAS / attack simulation tools to validate security controls in realistic scenariosSelect and replicate adversary tactics and techniques aligned with MITRE ATT&CKAnalyze simulation results to identify detection/control gaps and improvement opportunitiesDefine threat detection and mitigation strategies based on findingsDesign, develop, and fine-tune detection rules across SIEM / EDR / XDR platformsConfigure and manage lab environments to execute attack simulations safely and repeatablyAutomate evaluation and reporting workflows by building scripts/tools (e.g., Python, PowerShell, Bash)Produce technical and executive reports communicating risks, evidence, and recommendations clearly to customers
What we're looking forBachelor's degree in Engineering / Cybersecurity (or equivalent proven professional experience)2–3 years of experience in one or more of the following:Adversary simulation / BAS platforms (e.g., AttackIQ, Caldera, Cymulate, Pentera, SafeBreach, or similar)Detection engineering / SOC work creating and optimizing alerts in SIEM and/or EDRStrong understanding of Windows telemetry/logs and events for proactive detectionSolid grasp of adversary TTPs mapped to MITRE ATT&CKExperience with SIEM/EDR tools such as CrowdStrike, Cortex, Splunk, Elastic (ELK), LogRhythm, Microsoft Sentinel, QRadar, Chronicle, Wazuh (or comparable)Scripting skills (Bash, Python, PowerShell) for automation and toolingSystems administration knowledge across Windows and UNIX/LinuxSolid networking fundamentals (TCP/IP, DHCP, DNS, core protocols)"Purple mindset": think like an adversary while strengthening xqysrnh defensesAbility to communicate clearly in English in technical and international environmentsCertifications and/or a Master's degree in cybersecurity are a plus
What's offeredSalary range: €28k–€38k (depending on experience and capability)Barcelona or remote (telework) flexibility, with access to comfortable officesJoin an international, young, dynamic team with a great working environmentClose collaboration with Red Team and Blue Team, with exposure to multiple detection technologies and real-world scenariosContinuous training (internal + external), including certifications and annual conference attendancePersonalized career development plan aligned with your growthWork-life balance support + summer intensive scheduleFlexible compensation plan (meals, transport, childcare, training)Private health insurance
Interested? Apply via LinkedIn or submit your CV via .