At a Glance
- Tasks: Design and develop innovative threat detection capabilities to protect sensitive healthcare data.
- Company: Established biotech company leveraging AI and genetic data for precision healthcare.
- Benefits: Hybrid/remote work, flexible benefits, and a chance to innovate in cybersecurity.
- Other info: Join a fast-paced, collaborative team focused on real-world impact.
- Why this job: Lead impactful projects and contribute to advancing healthcare through cutting-edge technology.
- Qualifications: Strong KQL skills, experience with Microsoft Sentinel, and a proactive mindset.
The predicted salary is between 60000 - 80000 £ per year.
Join a well-established biotech company using large-scale genetic data and AI to predict disease risk and advance precision healthcare. We’re looking for a Threat Detection Engineer who thrives on innovation and technical ownership. This role is not a traditional SOC position — you’ll focus on building high-impact detection capabilities, shaping how security protects sensitive genomic and AI-driven data at scale.
Why This Role is Exciting
- High autonomy: Lead projects from idea to deployment
- Innovation-driven: Develop cutting-edge detections beyond standard SIEM rules
- Collaborative: Work closely with internal teams and an outsourced SOC partner
- Mission-focused: Protect critical healthcare data that supports precision medicine
Key Responsibilities
- Design and develop threat-led detections using threat intelligence and threat-hunting outputs
- Create novel analytic techniques for incident detection
- Collaborate with an MSP SOC to maintain and tune the detection catalogue
- Build automated reporting dashboards using Microsoft Sentinel workbooks
- Support security initiatives including ISO 27001 activities and KQL-based tasks
- Ensure monitoring coverage across cloud platforms, SaaS apps, and internal systems
- Contribute to documentation of processes, tools, and detection logic
What You’ll Bring
Must-Have Skills & Experience:
- Strong proficiency in KQL and hands-on experience with Microsoft Sentinel
- Familiarity with Microsoft Defender tools (Endpoint & O365)
- Exposure to Azure cloud logging and Kubernetes environments
- Knowledge of attacker TTPs and MITRE ATT&CK frameworks
- Proactive, collaborative, and innovative mindset
Desirable / Nice-to-Have:
- Experience with Python, Terraform, or CI/CD pipelines
- Familiarity with Microsoft Purview, Entra ID, DLP, or Insider Risk tools
- Understanding of ISO 27001, Agile ways of working
- Knowledge of statistics, data science, or AI/ML applied to cybersecurity
- Relevant certifications (MS-500, AZ-500, SC-series, Security+, GSOC, CCSK)
Perks & Benefits
- Hybrid/remote working options
- Flexible benefits package
- Opportunity to innovate and make a real impact in threat detection
- Work in a small, fast-paced, highly collaborative team
- Contribute to advancing precision healthcare using genomic data and AI
Ready to build next-generation threat detection and protect life-changing data? Apply today!
Threat Detection Engineer in Slough employer: Additional Resources Recruitment
Contact Detail:
Additional Resources Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Detection Engineer in Slough
✨Tip Number 1
Network like a pro! Reach out to folks in the biotech and cybersecurity space on LinkedIn. Join relevant groups, attend webinars, and don’t be shy about asking for informational interviews. You never know who might have the inside scoop on job openings!
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those involving KQL, Microsoft Sentinel, or any innovative detection techniques you've developed. This will give potential employers a taste of what you can bring to the table.
✨Tip Number 3
Prepare for the interview by brushing up on the MITRE ATT&CK framework and current trends in threat detection. Be ready to discuss how you would approach building high-impact detections and collaborate with teams. Confidence is key!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen. Plus, we love seeing candidates who are proactive about their job search. Let’s get you on board to innovate in threat detection!
We think you need these skills to ace Threat Detection Engineer in Slough
Some tips for your application 🫡
Tailor Your CV: Make sure your CV reflects the skills and experiences that match the Threat Detection Engineer role. Highlight your proficiency in KQL, Microsoft Sentinel, and any relevant projects you've led. We want to see how you can innovate and take ownership!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and how you can contribute to protecting sensitive genomic data. Let us know why you're excited about this role and how your background aligns with our mission.
Showcase Your Projects: If you've worked on any cool detection capabilities or threat-hunting projects, make sure to mention them! We love seeing real-world examples of your work, especially if they demonstrate your innovative mindset and technical skills.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re keen on joining our team!
How to prepare for a job interview at Additional Resources Recruitment
✨Know Your Tech Inside Out
Make sure you’re well-versed in KQL and Microsoft Sentinel, as these are crucial for the role. Brush up on your knowledge of Microsoft Defender tools and Azure cloud logging, so you can confidently discuss how you've used them in past projects.
✨Showcase Your Innovative Side
Prepare examples of how you've developed unique detection capabilities or analytic techniques. This role is all about innovation, so be ready to share your creative solutions and how they made an impact in previous positions.
✨Understand the Bigger Picture
Familiarise yourself with the MITRE ATT&CK framework and attacker TTPs. Being able to discuss how these concepts apply to threat detection will show that you’re not just technically skilled but also understand the strategic side of cybersecurity.
✨Be Ready to Collaborate
This position involves working closely with internal teams and an outsourced SOC partner. Prepare to discuss your experience in collaborative environments and how you’ve successfully worked with others to achieve security goals.