Disclaimer: Hunt UK Visa Sponsors aggregates job listings from publicly available sources, such as search engines, to assist with your job hunting. We do not claim affiliation with Investigo. For the most up-to-date job details, please visit the official website by clicking "Apply Now."
Security Engineer – Detect & Respond
Location: Cambridge (hybrid - Couple of days a month)
Salary: Upto £75,000
Right. Let’s skip the part where we tell you how “excited” we are about this role or how we’re a “fast-paced, dynamic” team. You’ve read that 100 times and it never means anything.
What does matter: we're building a world-class Incident Response function. Not “good enough”. Not “it’ll do”. World-class.
We need someone who knows how to handle complex security incidents without turning them into full-blown soap operas. Someone who can stare into the abyss (i.e. production cloud logs) and make sense of the chaos.
We’re not looking for a rockstar or a ninja. Just a seasoned Security Engineer who knows their craft and doesn’t need a babysitter or daily affirmations from HR.
What You’ll Actually Be Doing:
- Triage and investigate security events without crying wolf every five minutes.
- Build tooling and detection infrastructure that doesn’t collapse under scale.
- Write detection rules that reduce noise, not create it.
- Develop runbooks that don’t require a PhD to follow.
- Hunt threats like you mean it. Not because it’s trendy, but because it’s necessary.
- Automate the boring stuff so you can focus on the stuff that matters.
- Be part of an on-call rotation. Yes, that means some late nights. It’s called being in security.
- Talk to engineers like a human. And when needed, talk to stakeholders without making them panic.
What We’re Looking For:
- 8+ years in security engineering. If most of that was spent fixing printer issues or resetting passwords, this isn’t it.
- You understand the offensive side, but choose to play defense.
- You’ve led gnarly investigations. Not “I once reset a token” - actual multi-stakeholder, high-impact ones.
- Deep experience with AWS and how to actually secure it, not just click around in the console.
- You code. You automate. You think in systems.
- You know your way around SIEM/SOAR, but don’t treat them like magic boxes.
- Logs? Malware? Forensics? If that excites you, we’re off to a good start.
- You get MITRE ATT&CK, but also know that real-world attackers don’t always follow the playbook.
- You don’t get defensive when challenged. You get better.
- You can lead, but don’t need to micromanage.
- You're okay being wrong, so long as it helps us all get it right next time.
Why You Might Like It Here:
- You’ll work with smart people who care about doing things properly.
- We give you space to build and ownership to improve.
- Mistakes aren’t career-ending — unless you keep making the same one.
- We’ll treat you like an adult. Because you are one.