Security Engineer
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Security Manager
Description
As a Security Engineer, you will lead operational security efforts across the enterprise, including advanced threat detection, incident response, tool tuning, and alert automation. You will act as the technical escalation point for Sec Ops Technicians and take ownership of high‑fidelity security incidents. This role is focused on hands‑on defense – not policy or governance – and is ideal for a proactive defender who thrives in fast‑moving operational environments.
TopSkills’ Details
- CyA+, GCIH, GCIA, or equivalent technical certifications
- Experience with Splunk, Snort, Trend Micro, Cisco Secure
X, Umbrella, and related tools - Familiarity with scripting (Python, Power Shell) for automation or data enrichment
- Experience tuning alert rules and improving SOC signal‑to‑noise ratio
- Knowledge of packet capture and analysis techniques
- Notes:
The senior security engineer role (3+ years of security experience) is the priority, with a focus on proactive threat hunting (50% of time), supporting junior team members (30%), and training/skill development (20%).
- Will be shift based, will get that figured out when they start. Such as one week off, one week on, or two weeks off, and two weeks on- they are open to options.
- Shifts will be from Tuesday–Saturday – 8‑5 in their local time.
- Lead investigation and containment of security incidents across endpoints, network, cloud, and email platforms
- Act as escalation point for triaged alerts from Tier 1 SOC team
- Perform threat hunting and log correlation using SIEM and endpoint data
- Maintain and optimize detection rules, correlation logic, and suppression lists
- Engineer enhancements to alert response and workflow automation (SOAR or scripting)
- Integrate new data sources and threat intelligence into the SIEM
- Assist with red team/blue team exercises and detection gap analysis
- Create and maintain detailed incident response documentation and technical playbooks
- Monitor tool efficacy and performance; coordinate with vendors as needed
- Mentor junior team members on investigation methods and tooling
- Participate in a rotating on‑call schedule for major incident response
Skills & Qualifications
Bachelor’s degree in cybersecurity, information systems, or equivalent work experience
3+ years of hands‑on experience in a SOC, blue team, or incident response role
Strong expertise with at least two of the following: SIEM, EDR, firewalls, DNS security, email protection, log correlation
Proven ability to investigate and contain malware, phishing, lateral movement, and other attack techniques
Strong understanding of MITRE ATT&CK and how to map detections to attacker TTPs
Ability to write clear incident timelines and investigative findings
Employee Value Proposition (EVP)This is a great opportunity to be a part of building out a brand-new SOC. This opportunity does not come around often and can be a great resume builder.
Work EnvironmentThey will be working a hybrid schedule 3 days onsite and 2 remotes.
Monday‑Friday – 8‑5 local time
Job Type & LocationThis is a Contract to Hire position based out of Scottsdale, AZ.
Pay and BenefitsThe pay range for this position is $40.00 – $48.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following:
Medical, dental & vision Critical Illness, Accident, and Hospital 401(k) Retirement Plan – Pre‑tax and Roth post‑tax contributions available Life Insurance (Voluntary Life & AD&D for the employee and dependents) Short and long‑term disability Health Spending Account (HSA) Transportation benefits Employee Assistance Program Time Off/Leave (PTO, Vacation or Sick Leave)
This is a fully onsite position in Scottsdale, AZ.
Final date to receive applicationsThis position is anticipated to close on Dec 31, 2025.
Equal Opportunity StatementThe company is an equal‑opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).