NOTE: This is a FULLY remote role, but the candidate must be within the Latin America region and within the UTC-3 TO UTC-6 time zones to effectively collaborate with their team, peers, and internal customers. You do not have to be in the specific country or city shown in this listing, but please only apply if you are physically based within the Latin America region.
Hostaway is the market-leading SaaS scale-up transforming the vacation rental industry. With innovative solutions and partnerships with giants like Airbnb, VRBO, and Booking, we're taking on the competition and winning. Leveraging our customer-centric core values, we consistently deliver results that encourage growth, learning, and innovation for our team, our customers, and the industry.
As a profitable and growing company, this role is necessitated by our continued growth. Check out more about our recent funding round of $365 million here.
Hostaway is seeking a highly motivated Cyber Security Operations Specialist to join our team and drive our growth in the market.
About the RoleAs a Security Operations Specialist at Hostaway, you'll drive our security operations' technical and procedural aspects. You'll monitor and optimize a suite of security tools, proactively take actions to keep us safe, respond to incidents, and collaborate with teams to ensure security is integrated into our daily business. Just as important, you'll also develop, document, and refine processes like incident response playbooks, vulnerability management workflows, and user access audits for offboarding compliance to ensure our approach is consistent, auditable, and continuously improving. Your work will help us proactively defend against threats while building a mature, process-driven security culture.
An average day for a Security SpecialistStart your day with personal time to review overnight alerts and events from tools like EDR, MDM and IdP. Check for any critical incidents or trends that may require immediate attention.
Join the daily team sync for 15 minutes. Share priorities, escalate blockers or urgent findings, and align on the day's focus areas.
Address any critical or urgent matters first: triage and respond to high-priority incidents, coordinate immediate containment or remediation actions, and update incident response documentation as needed.
Follow up with stakeholders (engineering, IT, operations, business units) on the status of open vulnerabilities, patching progress, and access reviews. Track remediation SLAs and ensure accountability for outstanding issues.
Work on improving and maintaining security processes: update playbooks, refine response procedures, and document lessons from recent incidents for continuous improvement.
Analyze new bug bounty submissions and coordinate with engineering to plan and verify fixes.
Monitor and tune security tools (e.g., SIEM, EDR, MDM) for new alerts, misconfigurations, or suspicious activity. Schedule or review phishing simulations and assign targeted training if needed.
Conduct proactive threat hunting in SIEM logs and threat intelligence feeds, looking for indicators of compromise or emerging attack patterns.
Document the day's investigations, update incident and vulnerability records, and prepare summary reports for compliance needs.
Throughout the day – Support the team and stakeholders, automate repetitive tasks, and work on process improvements.
Job requirements5+ years of experience in security, with a focus on cyber security operations.
Hands-on experience with security tools such as EDR, MDM, IAM, SIEM, Cloud Security Posture Management (CSPM).
Strong understanding of incident detection, response, and root cause analysis for threats, including malware, phishing, and data breaches.
Experience developing, documenting, and maintaining security processes, incident response playbooks, and operational runbooks to ensure consistency and continuous improvement.
Experience in vulnerability management: prioritizing CVEs, tracking patching SLAs, validating fixes, and enforcing baseline configurations (e.g., CIS benchmarks for cloud and endpoints).
Proficiency in monitoring, tuning, and integrating security tools such as EDR, XDR, IdP, Email Security, DLP, and Mobile Device Management.
Ability to manage user access controls, conduct periodic reviews, enforce MFA and privileged access policies, and support technical evaluations to prevent privilege misuse.
What we offerCompetitive Compensation: We offer competitive pay based on market rates in the country of the applicant.
100% Remote: Enjoy the freedom to work from anywhere within your country of residence—be it a co-working space, your home office, or even your dining room table. The choice is yours. Just don’t ask to work in our office (we don’t have one).
Equity: Every role in our company comes with valuable stock options in a fast-growing and profitable company. This ensures we all share in the company’s success.
Values-Driven Leadership: Our Core Values are not just words we’ve written to make us feel good. We leverage them daily when making strategic and tactical decisions.
Professional Growth: Our rapid growth offers unparalleled learning and development opportunities, along with a multitude of career advancement opportunities.
Annual Paid Leave: The specific amounts vary by country and are aligned with country and/or contract-specific norms.
Geographic Specific Benefits: As an international employer, we offer different country-specific benefits such as Health Insurance and Pensions in countries where these perks are customary. The specifics depend on the country of the applicant.
Dynamic Team Culture: As a global company with team members in over 40 countries, our diverse and international culture fuels our innovation and creativity, providing a key pillar to our success (and making it a lot of fun to work here).
Thank you for your interest. If you apply for this role, you will receive an email from our Talent Acquisition team after your application has been reviewed alongside the qualifications for this role and the qualifications of others who have applied.
Applyor
Apply with IndeedShare jobRemoteRio de Janeiro, Rio de Janeiro, Brazil•Bogota, Distrito Capital de Bogotá, Colombia•San José, San José, Costa Rica•Buenos Aires, Ciudad Autónoma de Buenos Aires, Argentina•+3 morePeople & CultureMy informationFill out the information below
Full name *Email address *Phone number *BrazilBrazilInternationalAfghanistanAfghanistanCV or resume *Upload your CV or resume file
Upload a file or drag and drop hereUpload a file or drag and drop hereAccepted files: PDF, DOC, DOCX, JPEG and PNG up to 50MB.Cover letterUpload your cover letter
Upload a file or drag and drop hereUpload a file or drag and drop hereAccepted files: PDF, DOC, DOCX, JPEG and PNG up to 50MB.Write it here insteadQuestionsPlease fill in additional questions
Do you have hands-on experience with at least three of the following security tools: EDR, MDM, IAM, SIEM, or CSPM? *YesNoAre you proficient in monitoring, tuning, or integrating at least three of the following: EDR, XDR, IdP, Email Security, DLP, or MDM? *YesNoHave you developed, documented, or maintained security processes, incident response playbooks, or operational runbooks in your previous roles? *YesNoDescribe a time when you developed, documented, or maintained security processes, incident response playbooks, or operational runbooks. What was your approach, and what impact did your work have on your team or organization? *Do you require visa sponsorship to work? *YesNoWhat are your annual salary expectations? *USDWhat is your preferred work location? *Brazil (Rio de Janeiro, Rio de Janeiro, Brazil)Colombia (Bogota, Distrito Capital de Bogotá, Colombia)Costa Rica (San José, San José, Costa Rica)Argentina (Buenos Aires, Ciudad Autónoma de Buenos Aires, Argentina)All fields marked with * are required.
SendAll done!Your application has been successfully submitted!
Other jobs