At a Glance
- Tasks: Design and develop innovative threat detection capabilities for healthcare data.
- Company: Established biotech company focused on precision healthcare and AI.
- Benefits: Hybrid/remote work, flexible benefits, and a chance to innovate.
- Other info: Join a fast-paced, collaborative team dedicated to advancing healthcare.
- Why this job: Make a real impact in protecting critical healthcare data.
- Qualifications: Strong KQL skills and experience with Microsoft Sentinel required.
The predicted salary is between 60000 - 80000 £ per year.
Join a well-established biotech company using large-scale genetic data and AI to predict disease risk and advance precision healthcare. We’re looking for a Threat Detection Engineer who thrives on innovation and technical ownership. This role is not a traditional SOC position — you’ll focus on building high-impact detection capabilities, shaping how security protects sensitive genomic and AI-driven data at scale.
Why This Role is Exciting
- High autonomy: Lead projects from idea to deployment
- Innovation-driven: Develop cutting-edge detections beyond standard SIEM rules
- Collaborative: Work closely with internal teams and an outsourced SOC partner
- Mission-focused: Protect critical healthcare data that supports precision medicine
Key Responsibilities
- Design and develop threat-led detections using threat intelligence and threat-hunting outputs
- Create novel analytic techniques for incident detection
- Collaborate with an MSP SOC to maintain and tune the detection catalogue
- Build automated reporting dashboards using Microsoft Sentinel workbooks
- Support security initiatives including ISO 27001 activities and KQL-based tasks
- Ensure monitoring coverage across cloud platforms, SaaS apps, and internal systems
- Contribute to documentation of processes, tools, and detection logic
What You’ll Bring
Must-Have Skills & Experience:
- Strong proficiency in KQL and hands-on experience with Microsoft Sentinel
- Familiarity with Microsoft Defender tools (Endpoint & O365)
- Exposure to Azure cloud logging and Kubernetes environments
- Knowledge of attacker TTPs and MITRE ATT&CK frameworks
- Proactive, collaborative, and innovative mindset
Desirable / Nice-to-Have:
- Experience with Python, Terraform, or CI/CD pipelines
- Familiarity with Microsoft Purview, Entra ID, DLP, or Insider Risk tools
- Understanding of ISO 27001, Agile ways of working
- Knowledge of statistics, data science, or AI/ML applied to cybersecurity
- Relevant certifications (MS-500, AZ-500, SC-series, Security+, GSOC, CCSK)
Perks & Benefits
- Hybrid/remote working options
- Flexible benefits package
- Opportunity to innovate and make a real impact in threat detection
- Work in a small, fast-paced, highly collaborative team
- Contribute to advancing precision healthcare using genomic data and AI
Ready to build next-generation threat detection and protect life-changing data? Apply today!
Threat Detection Engineer in London employer: Additional Resources Recruitment
Contact Detail:
Additional Resources Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Detection Engineer in London
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect on LinkedIn. You never know who might have the inside scoop on job openings or can refer you directly.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those related to threat detection and KQL. This gives potential employers a taste of what you can do beyond your CV.
✨Tip Number 3
Prepare for interviews by brushing up on common technical questions and scenarios related to threat detection. Practice explaining your thought process clearly; it’s all about demonstrating your innovative mindset!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Threat Detection Engineer in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the Threat Detection Engineer role. Highlight your proficiency in KQL, Microsoft Sentinel, and any relevant projects you've led. We want to see how you can innovate and take ownership!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and how you can contribute to protecting sensitive genomic data. Let us know why you're excited about this role and how your background aligns with our mission.
Showcase Your Projects: If you've worked on any cool detection capabilities or threat-hunting projects, make sure to mention them! We love seeing real-world examples of your work, especially if they demonstrate your innovative mindset and technical skills.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re keen on joining our team!
How to prepare for a job interview at Additional Resources Recruitment
✨Know Your Tech Inside Out
Make sure you’re well-versed in KQL and Microsoft Sentinel, as these are crucial for the role. Brush up on your knowledge of Microsoft Defender tools and Azure cloud logging, so you can confidently discuss how you've used them in past projects.
✨Showcase Your Innovative Side
Prepare examples of how you've developed unique detection capabilities or analytic techniques in previous roles. This is a chance to demonstrate your creativity and problem-solving skills, which are key for this innovation-driven position.
✨Understand the Bigger Picture
Familiarise yourself with the MITRE ATT&CK framework and attacker TTPs. Being able to discuss how these concepts apply to protecting sensitive genomic data will show that you understand the mission-focused nature of the role.
✨Collaborate and Communicate
Since this role involves working closely with internal teams and an outsourced SOC partner, be ready to discuss your collaborative experiences. Highlight any instances where you’ve successfully worked in a team to achieve security goals, as this will resonate well with the interviewers.