Purpose of Role

The Threat Engineer is a professional technology role that requires collaboration with others to help plan and carry out the information security strategy. In this role you will be responsible for implementing tools, standards, and best practices to understand and respond to security incidents. Your responsibilities will include:

• Maintaining the confidentiality, integrity, and availability of information systems.

• Implementing security systems and controls.

• Monitoring and analyzing relevant logs, alerts, and events.

• Providing guidance on the application and operation of elementary physical, procedural and technical security controls.

• Investigating suspected attacks and supporting security incident management.

• Performing vulnerability assessments and business impact analyses for the rest of the business.

• Contributing to the selection and deployment of threat and vulnerability assessment tools and techniques.

• Maintaining operational security processes, which includes checking that all requests for support are dealt with according to agreed procedures.

• Investigating security incidents by following established procedures, and recommending remedial actions.

• Providing support and checking that corrective measures are implemented

• Maintaining security records and documentation.

• Implementing standard security operating procedures.

You will largely work on your own with regular supervision. There will be plenty of opportunities for you to interact with colleagues.


Monitor and analyze relevant logs, alerts, and events generated by security tools. Prioritize the severity of alerts and carry out research to confirm exposure. Resolve incidents and maintain the security of the business. You will need to use your discretion when identifying and responding to complex issues and determining what should be escalated to a higher level.

Implement security systems and controls by following established procedures. Configure and maintain security tools and contribute to the selection of new tools. Examples of tooling include: End point detection and response, Security incident and event monitoring, Email security tools, Security Orchestration automation and response, Vulnerability scanning and management, and other similar tools and platforms.

Provide guidance on the application and operation of elementary physical, procedural and technical security controls to peers and stakeholders. Guide application of security controls for IT and non-IT systems. This will involve interaction with colleagues to help influence decision-making.

Act as the lead on incident response activities and provide security input as security lead for non security incidents.

You will need a sound generic, domain, and specialist knowledge in information security and privacy, with an appreciation of the wider business context. You will be familiar with and be able to apply industry best practice, and absorb and use new information.

Skills & Experience Requiered

Extensive Experience OR Education of Associated or bachelor’s degree in related field

Certifications: Security +, CompTIA CySA+ , CISSP or other security cert

Required Experience: Experience with EDR, Log Management, Vuln Management, SOAR, Information security system implementation experience

Preferred Experience: Experience with scripting laguages such as Python

This is what we offer you:

  • Permanent contract. We want you to feel part of the team and get a stable long-term relationship with us.
  • Performance evaluations and career map with annual follow-ups.
  • Medical insurance.
  • 20% Bonus salary.