At a Glance
- Tasks: Investigate security incidents and proactively monitor for cyber threats in a dynamic environment.
- Company: Join Marqeta, a leading fintech company with a strong focus on security.
- Benefits: Enjoy premium medical coverage, generous time off, and equity options.
- Other info: Collaborative culture with opportunities to mentor junior team members.
- Why this job: Make a real impact in cybersecurity while working remotely or from our London office.
- Qualifications: 5+ years in security operations with expertise in incident response and threat hunting.
The predicted salary is between 60000 - 80000 ÂŁ per year.
We are seeking a UK-based Senior Security Engineer to join our Security Operations and Response Team as a senior individual contributor. In this role, you will investigate and respond to security incidents across Marqeta’s environment, proactively monitor for cyber threats, and serve as incident commander during security events of varying severity. You will contribute to the development and improvement of response methodologies aligned with the NIST Incident Response Lifecycle and help maintain cybersecurity incident response documentation. This position requires strong expertise in incident response, digital forensics, threat hunting, and security monitoring technologies. You will collaborate across teams, contribute to detection engineering efforts, and participate in 24x7 on-call rotations. The role reports to the Manager of Security Operations and Response. This role can be performed remotely anywhere in the UK, or from our London, UK office.
The Impact You’ll Have
- Proactively monitor Marqeta’s environment for cyber threat activity and manage day-to-day security alerts through timely analysis, triage, and appropriate response actions.
- Serve as incident commander during security events, directing investigation strategies and coordinating cross-functional response efforts.
- Execute incident response activities aligned with the NIST Incident Response Lifecycle to detect, contain, eradicate, recover, and learn from cybersecurity incidents.
- Contribute to the maintenance and improvement of the Cybersecurity Incident Response Plan (CIRP), playbooks, runbooks, and standard operating procedures to ensure consistent and effective response operations.
- Participate in 24x7x365 on-call rotations, providing skilled guidance during security incidents and contributing to thorough post-incident reviews.
- Research threat intelligence sources and contribute to hypothesis-driven threat hunting initiatives to uncover threats in corporate and production environments.
- Work closely with Security Engineering to tune security solutions, enhance detection capabilities, and leverage business knowledge to improve security monitoring.
- Design, develop, and maintain detection logic using a detections-as-code approach, collaborating with Security Solution Engineering to deploy detections through CI/CD pipelines into our SIEM and EDR platforms.
- Contribute to detection coverage mapped to MITRE ATT&CK framework, identifying gaps in visibility and supporting detection development prioritization based on threat intelligence and business risk.
- Coordinate with HR, law enforcement, response retainers, and cyber insurers as required, including support on cyber-crime financial fraud use cases.
- Support the development of less-experienced security team members through knowledge sharing, pair investigations, and leading by example.
- Partner with Fraud, Compliance, and Risk teams on security events involving payment systems, cardholder data, or regulatory reporting obligations under PCI DSS and related frameworks.
Who You Are
- 5+ years of hands-on experience in security operations with strong expertise in incident response, digital forensics, and threat hunting.
- Experience serving as an incident commander or leading incident response workstreams, with the ability to make sound decisions under pressure.
- Strong knowledge of the NIST Incident Response Lifecycle and experience contributing to incident response documentation and procedures.
- Proficiency with security monitoring and forensic tools including EDR, SIEM, and SOAR systems.
- Experience developing detections-as-code, including familiarity with version control, CI/CD pipelines, and detection testing frameworks.
- Working knowledge of MITRE ATT&CK and experience using it to assess detection coverage and map threat actor TTPs.
- Experience contributing to post-incident reviews and implementing security improvements based on lessons learned.
- Solid understanding of threat actor TTPs and ability to apply threat intelligence to enhance detection and response capabilities.
- Experience tuning security solutions and developing automation workflows to improve monitoring effectiveness and response efficiency.
- Working knowledge of AWS cloud services and securing cloud environments.
- Ability to effectively communicate with technical and non-technical stakeholders during security incidents and investigations.
- Experience in payment processing, fintech, or other highly regulated environments; familiarity with PCI DSS incident handling requirements a plus.
- Proven ability to work independently while demonstrating sound judgment about when to engage team members or escalate issues.
- Willingness to mentor and support the growth of junior security professionals in incident response techniques.
Typical Process
- Application submission
- Recruiter phone or video call
- Hiring manager video call
- Virtual "Onsite" consisting of 4-5, 45 min interviews
- Offer!
Compensation & Benefits
- Premium Private Medical and Dental coverage.
- Generous time off program with additional “Floating Holiday days”.
- Retirement savings program with company contribution.
- Equity in a publicly-traded company and an Employee Stock Purchase Program.
- Monthly stipend to support our remote work model.
- Annual development stipend to support our people's growth and development.
- Family-forming benefits and up to 20 weeks of Parental Leave.
- Wellbeing programs i.e. Modern Health, HealthKick and much more…
Senior Security Engineer - Detect & Response - EU/UK employer: Marqeta
Contact Detail:
Marqeta Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Security Engineer - Detect & Response - EU/UK
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, attend industry events, and join online forums. The more people you know, the better your chances of landing that Senior Security Engineer role.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your incident response projects, threat hunting initiatives, and any cool detection logic you've developed. This will give potential employers a taste of what you can bring to the table.
✨Tip Number 3
Prepare for interviews by brushing up on the NIST Incident Response Lifecycle and familiarising yourself with the MITRE ATT&CK framework. Be ready to discuss how you've applied these in real-world scenarios during your past experiences.
✨Tip Number 4
Don't forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team at Marqeta.
We think you need these skills to ace Senior Security Engineer - Detect & Response - EU/UK
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Security Engineer role. Highlight your experience in incident response, digital forensics, and threat hunting. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a perfect fit for our team. Don't forget to mention any relevant projects or achievements!
Showcase Your Technical Skills: In your application, be sure to showcase your technical expertise, especially with security monitoring tools like EDR and SIEM. We love seeing candidates who can demonstrate their knowledge of the NIST Incident Response Lifecycle and MITRE ATT&CK framework.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you'll be one step closer to joining our awesome team at StudySmarter!
How to prepare for a job interview at Marqeta
✨Know Your NIST Inside Out
Make sure you’re well-versed in the NIST Incident Response Lifecycle. Be ready to discuss how you've applied it in past roles, especially during high-pressure situations. This will show that you can lead incident response efforts effectively.
✨Showcase Your Technical Skills
Prepare to talk about your experience with security monitoring tools like EDR and SIEM systems. Bring examples of how you've developed detections-as-code and contributed to CI/CD pipelines. This will demonstrate your hands-on expertise and technical prowess.
✨Be Ready for Scenario Questions
Expect scenario-based questions where you’ll need to outline your approach to handling security incidents. Think through your decision-making process and how you coordinate with cross-functional teams. This will highlight your leadership skills as an incident commander.
✨Emphasise Collaboration and Mentorship
Discuss your experience working with various teams, such as Fraud and Compliance, and how you’ve mentored junior team members. This shows that you value teamwork and are committed to developing others in the field.