Join our Delta Hats (Native Spanish Speakers Freelancers)
About Us
At Delta Protect, we simplify and automate Cybersecurity and Compliance for startups and SMEs in Mexico and Latam, automating certifications like ISO 27001, PCI DSS, SOC 2, and HIPAA, alongside Pentesting, Vulnerability Analysis, and Cyber Intelligence. đ
From micro-businesses to unicorns đŠ, we believe Cybersecurity and Compliance are for everyone.
- + 150 companies trust us đ
- + 15 industries we love working with đ€
- + 7 countries with clients đ
- + 600 critical vulnerabilities detected and fixed đȘ
- +1M exposed data points detected on the Dark Web đ
Our Red Team
Delta Protect's Red Team is responsible for conducting offensive security assessments, such as Penetration Testing, Vulnerability Analysis, and Red Teaming Exercises, to identify as many vulnerabilities as possible in our clients' technological infrastructure. Our team of CISOs, Specialists, Ethical Hackers, and Developers has over 25 years of experience in cybersecurity and industry certifications.
How does the process work?
- Apply using our form đ©
- If your profile is a good fit for the position, we'll have a video call to get acquainted đ€
- After the video call, you will receive a challenge âïž
- We'll have a video call for you to explain how you solved the challenge đĄ
- Next, you will need to complete a Psychometric Test and have an interview with the Head of People & Culture đ
- After completing the above steps, the following documentation will be required:
-A valid government-issued ID (preferably a passport)
-Proof of residency in your country of residence.
-Proof of active taxpayer status in your country of residence.
Freelance Responsibilities:
- Conduct penetration tests based on your expertise (web applications, APIs, networks, mobile applications, cloud, thick clients, and source code review) to identify vulnerabilities and security issues.
- Perform comprehensive security assessments using both manual and automated techniques.
- Identify and exploit vulnerabilities to simulate real cyberattacks and assess the security posture of systems.
- Generate clear, well-structured reports of findings.
- Conduct re-testing to ensure applications and systems are secure, validating that vulnerabilities have been satisfactorily remediated.
- Attend meetings to review reports and provide feedback, as requested by the client.
- Conduct technical surveys to thoroughly understand our clients' technological infrastructure.
- Review requirements, specifications, and technical documents to provide reasoned and timely feedback.
- Report relevant findings and progress to management and other stakeholders.
- Stay updated with the latest security trends, tools, and techniques to continuously improve penetration testing methodologies.
What We're Looking For
- We are looking for a native Spanish speaker with fluent English, currently residing in Latin America.
- Proficiency in conducting comprehensive penetration tests across various domains based on your expertise (web applications, APIs, networks, mobile applications, cloud, thick clients, and source code review).
- Strong understanding of common vulnerabilities, attack vectors, and exploitation techniques.
- Experience using manual and automated testing methodologies to identify and exploit security weaknesses.
- Familiarity with industry-recognized penetration testing frameworks such as OWASP, PTES, NIST, OSSTMM, among others.
- Knowledge of regulatory compliance requirements and industry standards related to information security (e.g., GDPR, PCI DSS, HIPAA).
- Strong problem-solving skills and attention to detail to identify complex vulnerabilities and security weaknesses.
- Ability to work independently and as part of a team, manage time effectively, and prioritize tasks to meet project deadlines.
- Commitment to ethical conduct and adherence to professional standards in penetration testing engagements.
- Over 3 years of experience as a pentester. Proven track record of successful penetration testing in your area(s) of specialization (web applications, APIs, networks, mobile applications, thick clients, cloud (AWS, GCP, Azure), and source code review).
Certifications: Possession of relevant industry certifications, such as:
- Certified Ethical Hacker (CEH)
- Offensive Security Certified Professional (OSCP)
- Foundational Wireless Network Attacks (OSWP)
- Offensive Security Advanced Web Attacks and Exploitation (OSWE)
- GIAC Penetration Tester (GPEN)
- Certified Information Systems Security Professional (CISSP)
- EC-Council Certified Security Analyst (ECSA)
- Web Application Penetration Tester Extreme (eWPTXv2)
- Certified Professional Penetration Tester (eCPPTv2)
- Mobile Application Penetration Tester (eMAPT)
â



















