The Role:
We are seeking a Security Engineer specialising in Detection Engineering and Security Automation to design, build, and operate scalable detection and response capabilities across cloud and enterprise environments.
This role focuses on engineering high-fidelity detections and automating response workflows across platforms such as Rapid7, SentinelOne, and CrowdStrike, using Azure Logic Apps and API-driven integrations to reduce manual effort and improve response speed.
This is a hands-on engineering role for someone who thinks in attacker behaviours, builds resilient automation, and prefers engineering solutions over manual SOC processes.
Detection EngineeringDesign, implement, and continuously improve threat detections across endpoint, identity, vulnerability, and cloud telemetry.Engineer detections using data from Rapid7, SentinelOne, and CrowdStrike, including behavioural, anomaly-based, and contextual detections.Translate MITRE ATT&CK techniques and real-world threat intelligence into actionable detection logic.Develop and tune detection logic to reduce false positives while preserving signal quality.Validate detections through testing, attack simulation, and post-incident review.Maintain detection coverage mapping across the attack lifecycle.
Security Automation & SOARDesign and implement security automation workflows using Azure Logic Apps to support alert triage, enrichment, containment, and response.Automate workflows such as:Alert enrichment from asset inventories and vulnerability dataRisk-based prioritisation using exploitability and exposure contextEndpoint containment or isolation actionsCase creation, updates, and closure across security platformsIntegrate tools via REST APIs, webhooks, and managed connectors.Build modular, reusable automation components with robust error handling and observability.
Platform Integration & EngineeringIntegrate and correlate telemetry across Rapid7, SentinelOne, CrowdStrike, and supporting security systems.Work closely with security and cloud teams to onboard new data sources and ensure data quality.Apply detection-as-code and automation-as-code principles using version control and structured deployment processes.Build dashboards and metrics to measure detection efficacy, alert quality, and automation impact.
Incident Response & Continuous ImprovementSupport incident response by enhancing detections and automations based on real incidents.Feed learnings from investigations back into detection logic and response workflows.Maintain documentation, playbooks, and runbooks for detections and automations.Contribute to purple-team activities and detection gap analysis.
Core Technical SkillsProven experience in detection engineering, security operations engineering, or security automation roles.Hands-on experience with Rapid7, SentinelOne, and/or CrowdStrike in detection or response contexts.Strong experience building automation using Azure Logic Apps.Proficiency integrating systems using REST APIs, JSON payloads, authentication, and pagination.Solid understanding of endpoint security, vulnerability management, and attacker tradecraft.Deep familiarity with MITRE ATT&CK and behaviour-based detection methodologies.
Engineering & Operational SkillsStrong scripting or engineering background (e.g. Python, PowerShell).Experience working with structured data, event pipelines, and telemetry correlation.Understanding of alert lifecycle management and incident response workflows.Ability to design automation that is safe, resilient, and auditable.
PreferredExperience correlating endpoint, vulnerability, and asset data for risk-based detection.Familiarity with SOAR design patterns and automation governance.Exposure to cloud security telemetry and identity-based attack detection.Experience operating in large-scale or regulated environments.Knowledge of CI/CD or infrastructure-as-code approaches for security tooling.