Skip to content
  Thursday 4 December 2025
Trending
July 3, 2025<h3>Columbia University Hack Unveils Major Cybersecurity Flaws in Higher Ed</h3> December 29, 2024AWS Cybersecurity, Information System Security Officer (ISSO) January 4, 2025Introduction to Linux, Department of Cybersecurity – Adjunct Faculty February 9, 2024Senior Cybersecurity Analyst January 1, 2024The Importance of Spam Prevention for Data-Driven Businesses September 3, 2025CISA, NSA, and Global Partners Release a Shared Vision for Software Bill of Materials (SBOM) Guidance July 18, 2025Senior Cybersecurity Engineer January 22, 2024InMarket Faces FTC Ban for Unauthorized Sale of Precise User Location November 18, 2025Consultant- Cybersecurity March 29, 2024The Moon Botnet Returns, Using End-of-Life Devices for Criminal Proxy Operations
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Senior Engineer (Customer Cyber Threat Response)
Careers

Cybersecurity Senior Engineer (Customer Cyber Threat Response)

SecuredyouadmSecuredyouadm—May 5, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

We are seeking a skilled and detail-oriented Cybersecurity Senior Security engineer, who will be focused on customer-related security operations and incident response. This role is critical in detecting, analyzing, and responding to security incidents impacting our customers and products. The ideal candidate will leverage their expertise in Security Operations (SecOps), Incident Response (IR), and threat detection to ensure mitigation and resolution of security threats.Security Operations

  • Conducts threat analysis and alert triage using various security tools (e.g., SIEM, EDR, Intelligence platforms).
  • Investigates and responds to escalations involving phishing, account takeovers, data breaches, and other security issues.
  • Performs threat hunting to proactively identify malicious and fraudulent activity.
  • Analyzes threat intelligence to identify and mitigate emerging threats to businesses and customers.
  • Creates investigation workflows and steps, aligned to threat resolution.
  • Continuously improves and maintains investigation workflows, achieving process optimization and improved threat detection.
  • Collaborates with various teams and MSS, continuously improving cybersecurity capabilities (prevention, detection, response).
  • Supports customer-facing teams and relevant business stakeholders for various security issues.
  • Proposes and helps review security plans and policies to improve organizational security posture.
  • Provides off-hour support as needed for security administration, detection, and response activities.

Incident Response

  • Investigates and responds to customer impacting security incidents (e.g., Denial of Service, data breaches).
  • Investigates tactics, techniques, and procedures (TTPs) used by threat actors conducting malicious activity.
  • Correlates incident data to identify threat trends and specific vulnerabilities.
  • Conducts root cause analysis and develops remediation strategies to prevent incident recurrence.
  • Documents response activities and mitigation measures for internal and external stakeholders.
  • Plans, implements, and maintains incident handling procedures, continuously improving response effectiveness.
More stories

Senior Cybersecurity Information Assurance Specialist

November 27, 2023

Assistant Professor: Cybersecurity and Privacy

August 13, 2025

Tech Risk Engagement Lead – Regulatory Exam Management – Cybersecurity and Technology

October 2, 2024

Cybersecurity Architect

November 29, 2024

Service Desk and Incident Management

  • Supports investigations and resolution of customer-based security issues.

Project Responsibilities

  • Partners with teams, designs, implements, and refines customer-focused detection rules and processes.
  • Defines KPIs, builds dashboards, and reports on detection and response performance.

Professional Technology Skills (the professional technology skills you need to be able to do the job)Ability to:

  • Work with technical teams along with external MSSPs, for security monitoring of DDoS Protection, Email systems, Application logs, Intelligence platforms, and Endpoint security technologies.
  • Perform data analytics, security event correlation, and issue triage.
  • Apply security Threat Intelligence to respond appropriately to security events.
  • Work on projects to improve security monitoring and response capabilities.
  • Demonstrate a strong understanding of Zero Trust and security best practices.
  • Demonstrate a strong security engineering and architecture background.
  • Demonstrate effective communication of security issues to management and peers.
  • Maintain security monitoring guidelines and standards.
  • Perform incident response and forensic activities for internal and external threats.
  • Work with internal teams (IT, business), MSSPs, and external forensic services while responding to incidents.
  • Ensure all identified incidents are promptly and thoroughly investigated and remediated.
  • Ensure security incidents are documented accurately and thoroughly.

Knowledge, Experience & QualificationsEssential

  • Bachelor’s degree in Computer Science and 4+ years of industry related professional experience and education.
  • Multi-cloud security experience AWS, Azure, GCP
  • Expert level knowledge on WAF, Web Security, DDoS protection, data analytics, and Bot Mgmt.
  • Working experience with Information Security, Network Security, Security Monitoring and Incident Response.
  • Working experience with industry standard security technologies and services including Threat Intelligence, IPS, Endpoint Security, SIEM/SOAR.
  • Strong ability in investigative skills and problem solving.

Desirable

  • GSEC, GCIA, GFE, GCFA, CISA, CISSP, CISM, or CIA certification(s).
  • Dev Ops / Engineering / Network / System Administration experience.
  • Experience with various querying and scripting languages.

USD 118,800.00 – 198,000.00 per yearCompensation:Compensation includes a base salary of $118,800.00 – $198,000.00. The base salary may vary within the anticipated base pay range based on factors such as the ultimate location of the position and the selected candidate’s knowledge, skills, and abilities. Position may be eligible for additional compensation that may include an incentive program.Benefits:The Company offers eligible employees the flexibility to take as much vacation with pay as they deem consistent with their duties, the company’s needs, and its obligations; seven paid holidays throughout the calendar year; and up to 160 hours of paid wellness annually for their own wellness or that of family members. Employees are also eligible for additional paid time off in the form of bereavement leave, time off to vote, jury duty leave, volunteer time off, military leave, and parental leave.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cybersecurity Senior Engineer (Customer Cyber Threat Response)
Senior Cybersecurity WAF Engineer
Related posts
  • Related posts
  • More from author
Careers

Senior Manager, Cybersecurity IR and SOC

December 4, 20250
Careers

Senior Manager, Cybersecurity GRC

December 4, 20250
Careers

Cybersecurity Analyst

December 4, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

Advantech iView | CISA

December 4, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 4, 20250
Careers

Senior Manager, Cybersecurity IR and SOC

December 4, 20250
Careers

Senior Manager, Cybersecurity GRC

December 4, 20250
Careers

Cybersecurity Analyst

December 4, 20250
Careers

Senior Cybersecurity – CASB Engineer

December 4, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Advantech iView | CISA
  • Johnson Controls iSTAR | CISA
  • Senior Manager, Cybersecurity IR and SOC
  • Senior Manager, Cybersecurity GRC
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures