Detection Security Engineer (Hybrid option)Join a team of cybersecurity professionals and help Swiss Re to fulfill its mission in making the world more resilient. As the Detection Security Engineer, you'll be tasked with helping to close the security gaps by working with incident responders and hunting for sophisticated cyber threats. What's more, you'll be working in a hybrid setup, perfectly balancing work from home and the office premises.
About the teamThe Security Team is the focal point for all security activities across Swiss Re. We are responsible for cybersecurity engineering and operations, corporate security, governance, operational resilience, risk, and compliance. We define and advance the company's security strategy. As a part of a wider company Security Team, the Cyber Defence Engineering team has the mission to monitor, detect, and report cyber security-related threats targeting Swiss Re.
We're looking for a detection engineer who can identify, develop, and implement advanced threat detection and response engineering solutions.
In your role, you will…Be someone who believes in continuous innovation, is curious and relentless in finding a better way every day.Develop and maintain a deep understanding of the latest threat landscape, tactics, techniques, and procedures (TTPs) used by attackers.Develop and maintain expertise in threat detection tools and technologies, including SIEM systems, EDR (endpoint detection and response) tools, and network monitoring solutions.Be a part of a Purple Team to improve our security stance and implement your insights into rules.Continuously evaluate and improve the effectiveness of existing threat detection and response measures.Your qualificationsNobody is perfect and meets 100% of our requirements. If you, however, meet some of the criteria below and are curious about the world of cybersecurity attack detection, we'll be more than happy to meet you!
What we need from you:Passion, drive, and a belief in the value of cybersecurity operations as an enabler of business performance.Experience in the development of cybersecurity attack detection rules in complex corporate environments.The ability to communicate with a broad spectrum of stakeholders effectively – from cybersecurity analysts to threat intelligence experts.A track record of successful delivery in penetration tests and red team exercises as an ethical hacker.A high level of integrity, result-oriented approach, and composure under pressure.Strong communication, influencing, and collaboration skills.Knowledge of detection rule development, covering tools (such as SIEM, EDRs) and industry frameworks (such as MITRE ATT&CK).Nice-to-have:Expert proficiency in Python, Kusto, or other scripting languages.Experience working as a security analyst or incident responder (in a SOC/CSIRT/on-call setup).Experience with Azure security tooling and development within Azure.Analysis of web traffic, underlying malware, lateral movement, TTPs detected through Microsoft and Linux security events, etc.Logfile correlation and analysis.Malware and exploit analysis (or reverse engineering).Past collaboration with incident responders in developing detection rules and SOAR playbooks.
#J-18808-Ljbffr