
Senior Detection and Response Engineer at Intellectsoft. Location Information: Brazil - Remote. . Intellectsoft is a software development company delivering innovative solutions since 2007. We operate across North America, Latin America, the Nordic region, the UK, and Europe.We specialize in industries like Fintech, Healthcare, EdTech, Construction, Hospitality, and more, partnering with startups, mid-sized businesses, and Fortune 500 companies to drive growth and scalability. Our clients include Jaguar Motors, Universal Pictures, Harley-Davidson, Qualcomm, and London Stock Exchange.Together, our team delivers solutions that make a difference. Learn more at . www.intellectsoft.net. You’ll contribute to a cutting-edge platform designed for financial institutions and enterprises to launch and manage regulated stablecoins. The system empowers users to earn revenue from reserves and grow their digital ecosystems through integrated features like compliant stablecoin issuance, secure asset custody, and streamlined orchestration for cross-border transfers, on/off-ramping, and currency conversion. Leveraging our robust infrastructure and APIs, organizations can build, scale, and govern their stablecoin operations with enhanced efficiency, compliance, and profitability.. Requirements. . 3+ years of experience in a security operations, detection engineering, or . incident response. role. . Strong knowledge of . SIEM. tools (e.g., Splunk, Microsoft Sentinel, QRadar). . Experience with EDR solutions (e.g., CrowdStrike, SentinelOne, Defender for Endpoint). . Familiarity with cloud security (Azure, AWS, or GCP). . Scripting experience in Python, PowerShell, or similar for automation. . Understanding of MITRE ATT&CK framework and threat modeling. . Solid grasp of networking fundamentals and common attack techniques. . Experience in the financial or regulated sectors is a strong advantage. . Working knowledge of compliance standards such as ISO 27001, PCI DSS, and SOC 2. . Upper-Intermediate English level.. . Be able to overlap minimum 6 hours with US Eastern Time (EST). . . Responsibilities. . Develop and tune detection logic across SIEM, EDR/XDR, and other monitoring platforms. . Conduct triage and root-cause analysis of security alerts and incidents. . Lead incident response efforts including containment, remediation, and recovery. . Perform host- and network-based forensic investigations. . Integrate threat intelligence into detection and response workflows. . Develop automation scripts and playbooks for SOAR platforms. . Collaborate with DevOps, cloud, and IT teams to improve overall security posture. . Prepare post-incident reports and conduct lessons-learned sessions. . Support regular red team/blue team exercises and threat hunting initiatives. . Benefits. . 35 absence days per year for work-life balance. . Udemy courses of your choice. . English courses with native-speaker. . Regular soft-skills trainings. . Excellence Сenters meetups. . Online/offline team-buildings. . .