×
Register Here to Apply for Jobs or Post Jobs. X

Senior Cyber Security Engineer

Job in Houston, Harris County, Texas, 77246, USA
Listing for: FuntoNetwork Consulting
Full Time position
Listed on 2026-01-07
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below

Senior Cyber Security Engineer (Managed Detection & Response - MDR) Company Overview

Funto Network is a specialized IT consulting firm focused on delivering proactive cybersecurity solutions, with a core emphasis on Managed Detection & Response (MDR) services. We partner with organizations to serve as their dedicated cybersecurity team, offering 24/7 threat hunting, continuous monitoring, and rapid incident response. Our mission is to empower businesses with innovative, outcome-driven security operations, enabling them to operate securely and confidently in an evolving threat landscape.

Position

Summary

We are seeking a highly skilled and proactive Senior Cyber Security Engineer to join our core MDR delivery team. In this pivotal role, you will be responsible for defending our clients by actively hunting for threats, leading investigations into sophisticated security incidents, and continuously enhancing our detection and response capabilities. You will go beyond traditional monitoring to perform deep forensic analysis, develop custom detection logic, and guide containment and eradication efforts for a diverse portfolio of clients.

This is a hands‑on role for a practitioner who thrives in a dynamic, client-focused Security Operations Center (SOC) environment.

Key Responsibilities
  • Threat Hunting & Detection Engineering
    • Conduct proactive, hypothesis-driven threat hunting across client environments to identify advanced and persistent threats.
    • Develop, refine, and deploy custom detection rules (SIEM queries, YARA, EDR logic) to enhance detection accuracy and coverage.
    • Analyze adversary TTPs (Tactics, Techniques, and Procedures) to evolve hunting methodologies and detection strategies.
  • Incident Response & Investigation
    • Serve as the primary escalation point and lead investigator for complex security incidents.
    • Perform in-depth forensic analysis (endpoint, memory, network, cloud) to determine scope, root cause, and impact.
    • Lead remote containment, eradication, and recovery efforts in close coordination with client IT teams.
  • MDR Service Delivery & Client Partnership
    • Act as a trusted technical advisor for assigned MDR clients, providing expert insights during security reviews and post-incident briefings.
    • Author and deliver detailed incident reports, executive summaries, and actionable remediation guidance.
    • Proactively recommend security improvements based on observed telemetry, threats, and client risk profiles.
  • Security Stack Mastery & Optimization
    • Demonstrate deep expertise in our MDR technology stack (EDR/XDR, SIEM, network detection, threat intelligence platforms).
    • Optimize tool configurations, integrations, and alert workflows to maximize detection efficacy and operational efficiency.
  • Knowledge & Process Development
    • Contribute to the continuous improvement of MDR playbooks, runbooks, and standard operating procedures.
    • Mentor and provide technical guidance to junior Security Analysts and Engineers.
    • Develop and share threat intelligence briefings tailored to client industries.
Qualifications Required
  • Bachelor’s degree in Cybersecurity, Computer Science, or a related field, or equivalent hands‑on experience.
  • Minimum of 5 years in hands‑on security operations, with at least 2 years focused on threat hunting, incident response, or within an MDR/MSSP environment.
  • Deep technical experience with:
    • EDR platforms (e.g., Crowd Strike, Microsoft Defender for Endpoint, Sentinel One).
    • SIEM solutions (e.g., Splunk, Microsoft Sentinel, Elastic) for advanced querying and investigation.
    • Digital forensics and incident response (DFIR) methodologies and tools.
  • Proven ability to analyze malware, interpret attacker behavior, and conduct investigations across the cyber kill chain.
  • Strong knowledge of network protocols, OS internals (Windows, Linux, macOS), and cloud (AWS, Azure, GCP) security monitoring.
  • Excellent communication skills, with the ability to convey technical details clearly to both technical and executive audiences.
Preferred
  • Industry certifications such as GCFA, GNFA, GCIH, OSCP, CySA+, or platform-specific credentials (Splunk, Crowd Strike).
  • Experience in a consulting or client-facing MDR role.
  • Scripting proficiency (Python, Power…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary