At a Glance
- Tasks: Investigate security incidents and proactively monitor for cyber threats in a dynamic environment.
- Company: Join Marqeta, a leading fintech company with a focus on security innovation.
- Benefits: Enjoy premium medical coverage, generous time off, and equity options.
- Other info: Collaborative culture with opportunities to mentor junior team members.
- Why this job: Make a real impact in cybersecurity while working remotely or from our London office.
- Qualifications: 5+ years in security operations with expertise in incident response and threat hunting.
The predicted salary is between 70000 - 90000 ÂŁ per year.
We are seeking a UK-based Senior Security Engineer to join our Security Operations and Response Team as a senior individual contributor. In this role, you will investigate and respond to security incidents across Marqeta’s environment, proactively monitor for cyber threats, and serve as incident commander during security events of varying severity. You will contribute to the development and improvement of response methodologies aligned with the NIST Incident Response Lifecycle and help maintain cybersecurity incident response documentation. This position requires strong expertise in incident response, digital forensics, threat hunting, and security monitoring technologies. You will collaborate across teams, contribute to detection engineering efforts, and participate in 24x7 on-call rotations. The role reports to the Manager of Security Operations and Response. This role can be performed remotely anywhere in the UK, or from our London, UK office.
The Impact You’ll Have
- Proactively monitor Marqeta’s environment for cyber threat activity and manage day-to-day security alerts through timely analysis, triage, and appropriate response actions.
- Serve as incident commander during security events, directing investigation strategies and coordinating cross-functional response efforts.
- Execute incident response activities aligned with the NIST Incident Response Lifecycle to detect, contain, eradicate, recover, and learn from cybersecurity incidents.
- Contribute to the maintenance and improvement of the Cybersecurity Incident Response Plan (CIRP), playbooks, runbooks, and standard operating procedures to ensure consistent and effective response operations.
- Participate in 24x7x365 on-call rotations, providing skilled guidance during security incidents and contributing to thorough post-incident reviews.
- Research threat intelligence sources and contribute to hypothesis-driven threat hunting initiatives to uncover threats in corporate and production environments.
- Work closely with Security Engineering to tune security solutions, enhance detection capabilities, and leverage business knowledge to improve security monitoring.
- Design, develop, and maintain detection logic using a detections-as-code approach, collaborating with Security Solution Engineering to deploy detections through CI/CD pipelines into our SIEM and EDR platforms.
- Contribute to detection coverage mapped to MITRE ATT&CK framework, identifying gaps in visibility and supporting detection development prioritization based on threat intelligence and business risk.
- Coordinate with HR, law enforcement, response retainers, and cyber insurers as required, including support on cyber-crime financial fraud use cases.
- Support the development of less-experienced security team members through knowledge sharing, pair investigations, and leading by example.
- Partner with Fraud, Compliance, and Risk teams on security events involving payment systems, cardholder data, or regulatory reporting obligations under PCI DSS and related frameworks.
Who You Are
- 5+ years of hands-on experience in security operations with strong expertise in incident response, digital forensics, and threat hunting.
- Experience serving as an incident commander or leading incident response workstreams, with the ability to make sound decisions under pressure.
- Strong knowledge of the NIST Incident Response Lifecycle and experience contributing to incident response documentation and procedures.
- Proficiency with security monitoring and forensic tools including EDR, SIEM, and SOAR systems.
- Experience developing detections-as-code, including familiarity with version control, CI/CD pipelines, and detection testing frameworks.
- Working knowledge of MITRE ATT&CK and experience using it to assess detection coverage and map threat actor TTPs.
- Experience contributing to post-incident reviews and implementing security improvements based on lessons learned.
- Solid understanding of threat actor TTPs and ability to apply threat intelligence to enhance detection and response capabilities.
- Experience tuning security solutions and developing automation workflows to improve monitoring effectiveness and response efficiency.
- Working knowledge of AWS cloud services and securing cloud environments.
- Ability to effectively communicate with technical and non-technical stakeholders during security incidents and investigations.
- Experience in payment processing, fintech, or other highly regulated environments; familiarity with PCI DSS incident handling requirements a plus.
- Proven ability to work independently while demonstrating sound judgment about when to engage team members or escalate issues.
- Willingness to mentor and support the growth of junior security professionals in incident response techniques.
Typical Process
- Application submission
- Recruiter phone or video call
- Hiring manager video call
- Virtual "Onsite" consisting of 4-5, 45 min interviews
- Offer!
Compensation & Benefits
- Premium Private Medical and Dental coverage.
- Generous time off program with additional “Floating Holiday days”.
- Retirement savings program with company contribution.
- Equity in a publicly-traded company and an Employee Stock Purchase Program.
- Monthly stipend to support our remote work model.
- Annual development stipend to support our people's growth and development.
- Family-forming benefits and up to 20 weeks of Parental Leave.
- Wellbeing programs i.e. Modern Health, HealthKick and much more…
Senior Security Engineer - Detect & Response - EU/UK employer: MQ Referrals Only
Contact Detail:
MQ Referrals Only Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Security Engineer - Detect & Response - EU/UK
✨Tip Number 1
Network like a pro! Reach out to your connections in the cybersecurity field, attend industry events, and join online forums. The more people you know, the better your chances of hearing about job openings before they’re even advertised.
✨Tip Number 2
Prepare for interviews by brushing up on your incident response skills. Be ready to discuss real-life scenarios where you’ve successfully managed security incidents. We want to hear how you’ve applied your expertise in digital forensics and threat hunting!
✨Tip Number 3
Show off your knowledge of the NIST Incident Response Lifecycle during interviews. It’s crucial for this role, so make sure you can explain how you’ve used it in past experiences. This will demonstrate your fit for the Senior Security Engineer position.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team at Marqeta.
We think you need these skills to ace Senior Security Engineer - Detect & Response - EU/UK
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Senior Security Engineer role. Highlight your experience in incident response, digital forensics, and threat hunting. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a perfect fit for our team. Let us know what excites you about working at StudySmarter!
Showcase Your Achievements: Don’t just list your responsibilities; showcase your achievements! Include specific examples of how you've improved security processes or responded to incidents effectively. We love seeing quantifiable results!
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss any important updates from us!
How to prepare for a job interview at MQ Referrals Only
✨Know Your NIST Inside Out
Make sure you’re well-versed in the NIST Incident Response Lifecycle. Be ready to discuss how you've applied it in past roles, especially during high-pressure situations. This will show that you can lead incident response efforts effectively.
✨Showcase Your Technical Skills
Prepare to talk about your experience with security monitoring tools like EDR and SIEM systems. Bring examples of how you've developed detections-as-code and contributed to CI/CD pipelines. This will demonstrate your hands-on expertise and technical prowess.
✨Be Ready for Scenario Questions
Expect scenario-based questions where you’ll need to outline your approach to handling security incidents. Think through your decision-making process and how you coordinate with cross-functional teams. This will highlight your leadership skills as an incident commander.
✨Emphasise Collaboration and Mentorship
Discuss your experience working with various teams, such as Fraud and Compliance, and how you’ve mentored junior team members. This shows that you value teamwork and are committed to developing others in the field, which is crucial for this role.