Cyber Security Engineer
Role details
Job location
Tech stack
Job description
To strengthen the organisation's Detection and Response capability by providing threat hunting, incident investigation and malware analysis. This is a technical role for a high-calibre analyst ready to take a step up. The role works closely with the Senior Security Engineer to ensure that findings translate into durable remediation and improved operational security., * Perform threat hunting using a suite of tooling and available telemetry from Microsoft and third-party security services.
- Investigate security incidents: triage, analysis, containment recommendations, and support to eradication and recovery.
- Conduct malware triage and analysis to determine impact, behaviour and required mitigations.
- Develop and tune detection logic and playbooks, in collaboration with the SOC service and wider Security team.
- Provide operational evidence and metrics to support Cyber Essentials Plus (annual) and customer audits.
- Support vulnerability and patch compliance activities by validating remediation and verifying closure.
- Contribute to Penetration testing response.
- Contribute to cyber communications: short briefings, lessons learned, and targeted awareness messaging.
- Support the maintenance of ITSM, and address Cyber related tickets.
Security services and tooling
- EDR/XDR, SIEM, Endpoint Device and application management
- Data governance and information protection.
- Firewalls, remote access (RAS), secure web gateway (SWG), SASE.
- SMTP security
- Vulnerability management.
- Patch distribution
- ITAM
Working relationships Senior Security Engineer: Tight technical pairing (detect investigate remediate
- verify).
- InfoSec Lead: Provide operational evidence and support assurance narratives for audits/SAQs/Penetration test remediation.
- SOC service: Coordinate on alert quality, escalation, and detection improvements.
Requirements
- Degree in Cyber Security (or closely related discipline).
- 2-3 years' post-graduation experience in a commercial security role (SOC, IR, security operations, or similar).
- Strong analytical capability and curiosity; able to form hypotheses and test them against telemetry.
- Understanding of incident response lifecycle and basic forensic principles.
- Clear written and verbal communication, with the confidence to escalate and explain findings.
- Self-starter mindset suited to a hybrid/WFH environment.
Desirable
- Experience with SIEM/EDR tooling.
- Practical malware analysis experience (static or dynamic triage).
- Experience contributing to Cyber Essentials Plus evidence gathering or audit support.
- Motivation to develop a cyber security career through personal development and performance in threat hunting and incident response.
Personal attributes
- Technically rigorous with strong attention to detail.
- Comfortable working autonomously and prioritising without close supervision.
- Credible and professional; able to work directly with senior engineers and stakeholders.
- Collaborative: enjoys working in a paired model to drive root-cause fixes and improvement.
Security checks
Employment is subject to satisfactory references and appropriate security clearance checks commensurate with the role and customer requirements.