HOME Job Seeker Detection Security Engineers – Zurich

Detection Security Engineers – Zurich

Job Type
Full Time
IT & Security
Zurich, Switzerland

Role Description:

Be someone who believes in continuous innovation, is curious and relentless in finding a better way every day Develop and maintain a deep understanding of the latest threat landscape, tactics, techniques, and procedures (TTPs) used by attackers Develop and maintain expertise in threat detection tools and technologies, including SIEM systems, EDR (endpoint detection and response) tools, and network monitoring solutions


Be a part of a Purple Team to improve our security stance and implement your insights into rules Continuously evaluate and improve the effectiveness of existing threat detection and response measures



Cyber Security, Digital : Digital Security


Experience (Years):




Essential Skills:

SIEM engineers with experience on log onboarding in elastic stack, including parsing and normalizing data.

Passion, drive, and a belief in the value of cybersecurity operations as an enabler of business performance

Experience in development of cybersecurity attacks detection rules in complex corporate environments

The ability to communicate with a broad spectrum of stakeholders effectively from cybersecurity analysts to threat intelligence experts

A track record of successful delivery in penetration tests and red team exercises as an ethical hacker

A high level of integrity, result-oriented approach, and composure under pressure

Strong communication, influencing, and collaboration skills

Knowledge of detection rule development, covering tools (such as SIEM, EDRs) and industry frameworks (such as MITRE ATT&CK?)


Desirable Skills:

Expert proficiency in Python, Kusto, or other scripting language

Experience working as a security analyst or incident responder (in a SOC/CSIRT/on-call setup) Experience with Azure security tooling and development within Azure Analysis of web traffic, underlying malware, lateral movement, TTPs detected through Microsoft and Linux security events, etc.

Logfile correlation and analysis Malware and exploit analysis (or reverse engineering)

Past collaboration with incident responders in developing detection rules and SOAR playbooks

Contact us