At a Glance
- Tasks: Architect a cutting-edge AI detection platform to transform security operations.
- Company: Innovative cybersecurity organisation redefining modern security practices.
- Benefits: Highly competitive compensation and flexible remote/hybrid work options.
- Other info: Join a dynamic team with opportunities for growth and innovation.
- Why this job: Be a pioneer in building next-gen security solutions with real-world impact.
- Qualifications: Expertise in Cybersecurity AI Automation and advanced KQL required.
The predicted salary is between 80000 - 100000 £ per year.
An innovative cybersecurity organisation is building a next-generation, AI-supported detection platform from the ground up to redefine how modern security operations are delivered at scale. This is not a traditional SOC, SIEM, or detection engineering role focused on tuning pre-built rules within legacy platforms. Instead, the successful candidate will architect the logic, data flows, and intelligence layer behind a custom-built detection platform designed to transform raw security telemetry into high-confidence indicators of compromise across thousands of organisations. The successful candidate will play a foundational role in shaping a modern, automation-first SOC capability built around advanced analytics, behavioural detection, and AI-supported triage.
The Cybersecurity Architect will design and build the detection platform itself defining how security data is ingested, normalised, enriched, analysed, scored, and surfaced into meaningful security outcomes. This is a ground-floor architecture role for someone who wants to build a detection capability from first principles rather than inherit and maintain legacy security tooling.
Key Responsibilities- Design and evolve a custom multi-stage detection pipeline spanning ingestion, normalisation, enrichment, behavioural analysis, and indicator generation.
- Write advanced KQL across large-scale telemetry platforms such as Azure Data Explorer to support detection logic, hunting queries, pipeline transformations, and ML-assisted analytics.
- Architect detection workflows that progress data through analytical tiers from raw collection to high-confidence confirmed indicators.
- Define signal scoring, prioritisation, and surfacing methodologies to ensure exceptional signal quality and minimal noise at scale.
- Work with large-scale Microsoft 365 and cloud security telemetry across Defender, Entra ID, Exchange, SharePoint, endpoint, and identity data.
- Collaborate with data engineering and platform teams to design scalable, event-driven detection architectures and telemetry pipelines.
- Apply threat-led and behavioural detection methodologies to model real attacker behaviour rather than static IOC-based approaches.
- Influence platform design through investigation and operational security expertise to ensure detections produce actionable, defensible outcomes.
- Establish detection engineering standards, architecture patterns, and technical best practices.
- Act as a senior technical authority within the detection engineering and SOC architecture function.
- Experience working on Cybersecurity AI Automation architecture.
- Expert-level KQL with the ability to write advanced detection logic, hunting queries, and analytical transformations across large-scale telemetry environments.
- Deep experience designing and building custom detection pipelines including ingestion, normalisation, enrichment, scoring, and alert/indicator generation.
- Proven track record architecting SOC or detection platforms focused on signal quality, noise reduction, and scalable detection at volume.
- Strong understanding of behavioural detection engineering and threat-led analytics.
- Experience working with high-volume security telemetry and complex cloud/distributed data models.
- Strong familiarity with Microsoft 365 security telemetry including Defender, Entra ID, Exchange, SharePoint, endpoint, and identity signals.
- Ability to assess detection outcomes from an analyst/investigation perspective to ensure outputs are actionable and operationally valuable.
- DFIR / Incident Response / Investigation experience.
- Experience building or contributing to commercial security platforms (MDR, XDR, MSSP, or internal detection products).
- Familiarity with Azure Data Explorer, streaming analytics, event-driven architectures, or large-scale data pipeline design.
- Experience designing detections for multi-tenant or enterprise-scale environments.
- Exposure to machine learning / anomaly detection concepts within security analytics.
Locations
CyberSecurity AI Automation Architect in Ipswich, Suffolk employer: Develop
Contact Detail:
Develop Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land CyberSecurity AI Automation Architect in Ipswich, Suffolk
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity space. Attend meetups, webinars, or even online forums. The more people you know, the better your chances of landing that dream job!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your projects, especially those related to AI automation and detection engineering. This is your chance to demonstrate what you can do beyond just a CV.
✨Tip Number 3
Tailor your approach! When reaching out to potential employers, mention specific projects or technologies they’re working on. Show them you’ve done your homework and are genuinely interested in their work.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for talented individuals like you. Plus, applying directly can sometimes give you an edge over other candidates.
We think you need these skills to ace CyberSecurity AI Automation Architect in Ipswich, Suffolk
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the CyberSecurity AI Automation Architect role. Highlight your experience with KQL, detection pipelines, and any relevant projects that showcase your skills in building custom detection platforms.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background aligns with our mission at StudySmarter. Be sure to mention specific experiences that relate to the job description.
Showcase Your Technical Skills: Don’t hold back on showcasing your technical skills! Include examples of your work with Microsoft 365 security telemetry and any advanced analytics you've implemented. This will help us see your expertise in action.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s the easiest way for us to keep track of your application and ensure it reaches the right people!
How to prepare for a job interview at Develop
✨Know Your Tech Inside Out
Make sure you’re well-versed in the technologies mentioned in the job description, especially KQL and Azure Data Explorer. Brush up on your knowledge of custom detection pipelines and be ready to discuss how you've designed or worked with them in the past.
✨Showcase Your Problem-Solving Skills
Prepare to share specific examples of how you've tackled complex cybersecurity challenges. Think about times when you’ve had to architect solutions from scratch or improve existing processes, and be ready to explain your thought process.
✨Understand the Bigger Picture
Familiarise yourself with the latest trends in cybersecurity, particularly around AI and automation. Be prepared to discuss how these trends can impact detection engineering and how you envision contributing to a modern SOC capability.
✨Ask Insightful Questions
Prepare thoughtful questions that show your interest in the role and the company’s vision. Inquire about their current detection strategies, the challenges they face, and how they see the role evolving as technology advances.