At a Glance
- Tasks: Design and develop innovative threat detection capabilities to protect sensitive healthcare data.
- Company: Established biotech company focused on precision healthcare using AI and genetic data.
- Benefits: Hybrid/remote work, flexible benefits, and a chance to make a real impact.
- Other info: Join a small, fast-paced team dedicated to advancing healthcare through technology.
- Why this job: Lead projects with high autonomy and collaborate in a mission-driven environment.
- Qualifications: Proficiency in KQL, experience with Microsoft Sentinel, and a proactive mindset.
The predicted salary is between 60000 - 80000 £ per year.
Join a well-established biotech company using large-scale genetic data and AI to predict disease risk and advance precision healthcare. We’re looking for a Threat Detection Engineer who thrives on innovation and technical ownership. This role is not a traditional SOC position — you’ll focus on building high-impact detection capabilities, shaping how security protects sensitive genomic and AI-driven data at scale.
Why This Role is Exciting
- High autonomy: Lead projects from idea to deployment
- Innovation-driven: Develop cutting-edge detections beyond standard SIEM rules
- Collaborative: Work closely with internal teams and an outsourced SOC partner
- Mission-focused: Protect critical healthcare data that supports precision medicine
Key Responsibilities
- Design and develop threat-led detections using threat intelligence and threat-hunting outputs
- Create novel analytic techniques for incident detection
- Collaborate with an MSP SOC to maintain and tune the detection catalogue
- Build automated reporting dashboards using Microsoft Sentinel workbooks
- Support security initiatives including ISO 27001 activities and KQL-based tasks
- Ensure monitoring coverage across cloud platforms, SaaS apps, and internal systems
- Contribute to documentation of processes, tools, and detection logic
What You’ll Bring
Must-Have Skills & Experience:
- Strong proficiency in KQL and hands-on experience with Microsoft Sentinel
- Familiarity with Microsoft Defender tools (Endpoint & O365)
- Exposure to Azure cloud logging and Kubernetes environments
- Knowledge of attacker TTPs and MITRE ATT&CK frameworks
- Proactive, collaborative, and innovative mindset
Desirable / Nice-to-Have:
- Experience with Python, Terraform, or CI/CD pipelines
- Familiarity with Microsoft Purview, Entra ID, DLP, or Insider Risk tools
- Understanding of ISO 27001, Agile ways of working
- Knowledge of statistics, data science, or AI/ML applied to cybersecurity
- Relevant certifications (MS-500, AZ-500, SC-series, Security+, GSOC, CCSK)
Perks & Benefits
- Hybrid/remote working options
- Flexible benefits package
- Opportunity to innovate and make a real impact in threat detection
- Work in a small, fast-paced, highly collaborative team
- Contribute to advancing precision healthcare using genomic data and AI
Ready to build next-generation threat detection and protect life-changing data? Apply today!
Remote Engineer:in (m/w/d) employer: Additional Resources Recruitment
Contact Detail:
Additional Resources Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Remote Engineer:in (m/w/d)
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at meetups. A friendly chat can lead to opportunities that aren’t even advertised yet.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repo showcasing your projects, especially those related to threat detection and KQL. It’s a great way to demonstrate your expertise beyond just a CV.
✨Tip Number 3
Prepare for interviews by practising common questions and scenarios specific to threat detection. We recommend doing mock interviews with friends or using online platforms to get comfortable.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace Remote Engineer:in (m/w/d)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the Threat Detection Engineer role. Highlight your proficiency in KQL, Microsoft Sentinel, and any relevant projects you've led. We want to see how you can bring innovation to our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and how your background aligns with our mission of advancing precision healthcare. Let us know why you're excited about this role and how you can contribute to our innovative projects.
Showcase Your Technical Skills: Don’t hold back on showcasing your technical expertise! Mention any experience with Python, Terraform, or CI/CD pipelines, as well as your familiarity with Microsoft Defender tools. We love seeing candidates who are proactive and innovative in their approach.
Apply Through Our Website: We encourage you to apply directly through our website for the best chance of getting noticed. It’s the easiest way for us to keep track of your application and ensure it reaches the right people. We can’t wait to see what you bring to the table!
How to prepare for a job interview at Additional Resources Recruitment
✨Know Your Tech Inside Out
Make sure you’re well-versed in KQL and Microsoft Sentinel, as these are crucial for the role. Brush up on your knowledge of Azure cloud logging and Kubernetes environments too, as they might come up during technical discussions.
✨Showcase Your Innovative Side
Prepare to discuss any past projects where you developed novel detection techniques or automated reporting dashboards. Highlight your proactive approach and how you’ve contributed to security initiatives in previous roles.
✨Understand the Bigger Picture
Familiarise yourself with the MITRE ATT&CK framework and attacker TTPs. Being able to articulate how these concepts apply to the role will demonstrate your understanding of threat detection and incident response.
✨Be Ready to Collaborate
Since this role involves working closely with internal teams and an outsourced SOC partner, be prepared to discuss your experience in collaborative environments. Share examples of how you’ve successfully worked with others to achieve common goals.