Intellectsoft is a software development company delivering innovative solutions since 2007. We operate across North America, Latin America, the Nordic region, the UK, and specialize in industries like Fintech, Healthcare, EdTech, Construction, Hospitality, and more, partnering with startups, mid-sized businesses, and Fortune 500 companies to drive growth and scalability. Our clients include Jaguar Motors, Universal Pictures, Harley-Davidson, Qualcomm, and London Stock Exchange.Together, our team delivers solutions that make a difference. Learn more at
You’ll contribute to a cutting-edge platform designed for financial institutions and enterprises to launch and manage regulated stablecoins. The system empowers users to earn revenue from reserves and grow their digital ecosystems through integrated features like compliant stablecoin issuance, secure asset custody, and streamlined orchestration for cross-border transfers, on / off-ramping, and currency conversion. Leveraging our robust infrastructure and APIs, organizations can build, scale, and govern their stablecoin operations with enhanced efficiency, compliance, and profitability.
Requirements
- 3+ years of experience in a security operations, detection engineering, or incident response role
- Strong knowledge of SIEM tools (, Splunk, Microsoft Sentinel, QRadar)
- Experience with EDR solutions (, CrowdStrike, SentinelOne, Defender for Endpoint)
- Familiarity with cloud security (Azure, AWS, or GCP)
- Scripting experience in Python, PowerShell, or similar for automation
- Understanding of MITRE ATT&CK framework and threat modeling
- Solid grasp of networking fundamentals and common attack techniques
- Experience in the financial or regulated sectors is a strong advantage
- Working knowledge of compliance standards such as ISO 27001, PCI DSS, and SOC 2
- Upper-Intermediate English level.
- Be able to overlap minimum 6 hours with US Eastern Time (EST)
Responsibilities
Develop and tune detection logic across SIEM, EDR / XDR, and other monitoring platformsConduct triage and root-cause analysis of security alerts and incidentsLead incident response efforts including containment, remediation, and recoveryPerform host- and network-based forensic investigationsIntegrate threat intelligence into detection and response workflowsDevelop automation scripts and playbooks for SOAR platformsCollaborate with DevOps, cloud, and IT teams to improve overall security posturePrepare post-incident reports and conduct lessons-learned sessionsSupport regular red team / blue team exercises and threat hunting initiativesBenefits
35 absence days per year for work-life balanceUdemy courses of your choiceEnglish courses with native-speakerRegular soft-skills trainingsExcellence Сenters meetupsOnline / offline team-buildings