Information Security Engineer

Smart Recruiters
London
1 week ago
Create job alert

Job Description

ABOUT US: 

The Security Engineering squad is a group of security engineers with the clear mission to enable IT Security and Information Security processes by internally providing specialized services. The squad acts as an internal service provider supporting both security focused teams and other business units. 

As Subject Matter Experts (SME), Security Engineers are required to be technically equipped to take over responsibility of services operated and offered internally. The services in scope currently cover typical SOC solutions (SIEM, NIDS, SOAR, WAF, etc.).  

 

THE CHALLENGE: 

  • Take responsibility over a set of tool sets. 
  • Design, architect and implement technical solutions based on business requirements. 
  • Perform regular maintenance to mature the service setup and ensure a healthy state. 
  • Implement continuous improvements following business updates. 
  • Adapt the service based on self-driven recommendations and user requirements. 
  • Ensure service availability by continuous monitoring of resources, service usage and license utilization. 
  • Identifying opportunities to improve security services and monitoring. 
  • Act as a primary point of contact towards internal users in addition to conducting ongoing and on demand training internally. 
  • Ensure and maintain compliance of the toolsets in scope for the various audits (ISO, SOX, etc.). 
  • Conduct Proof of Concept/Value by researching technologies and evaluating vendors and products following industry best practices. 
  • Support product and vendor decisions with planning, implementation and documentation. 
  • Support your team members on their tasks. 
  • Maintain and develop detailed and up to date internal documentation. 
  • Contribute to the development and implementation of security governance in IT, ensuring application security principles are applied during design and into business as usual processes to reduce risk, drive adoption and adherence to policies, standards and guidelines by the wider business. 
  • Provide advice and guidance to other teams within the business on good practice and maintain relevant and current industry knowledge. 

 

ABOUT YOU: 

  • 5+ years of experience working in a security operations environment, preferably in a security engineering role. (or a related role, i.e. System Administrator with security responsibilities). 
  • Familiarity with cloud/virtualization technologies (AWS, GCP and K8s) and automation (ansible, puppet, terraform etc.) 
  • Understanding of fundamental security concepts and terminologies (CIA, basic cryptography knowledge etc.) 
  • Advanced scripting skills in Python, Bash, PowerShell etc. 
  • Advanced Network knowledge, including Firewall management.
  • Familiarity with SIEM tools (Splunk, Elastic Stack etc.) 
  • Good knowledge of identified operating system platforms; routers, network protocols, and security architecture. 
  • Good knowledge of industry standard security tools for implementation, administration and usage. 
  • Advanced networking, analysis and security skills. 
  • Ability to work independently, to carry responsibility and to self-learn. 
  • Excellent oral and written communication skills for both technical and non-technical audiences. 
  • Fluency in English. 

     

Desired Experience:

  • Experience working in a Security Operations Centre or as a Security Engineer. 
  • Fluency in programming languages i.e. Python. 
  • Applied experience working with M365 security tools (MDATP, MS Defender for Identity etc.) 
  • A track record of technical delivery working within a fast paced and pressured environment. 

     

Desired Qualifications, Education and Certifications:

  • Advanced college coursework in Computer Science or Information Technology, or equivalent experience 
  • Bachelor’s Degree in Computer Science, Information Technology, Information Security or similar, or equivalent industry experience. 
  • Industry certifications such as: CISSP/CISM, SANS GIAC Certifications, C.E.H/L.P.T, Other relevant certs 

 

OUR RECRUITMENT PROCESS:

  • Initial Screening: A quick chat with our Talent Acquisition Partner to understand your background and expectations. 
  • Two Technical Interviews: Meet with the Technical team and later with the Hiring Manager to dive into your solution, as also discuss team fit. 
  • Onsite Interview: Meet with the local team and take a tour of our office for a final meet-and-greet. 
  • Finals Steps: Receive feedback and, if successful, an offer! 


Additional Information

At Sportradar, we celebrate our diverse group of hardworking employees. Sportradar is committed to ensuring equal access to its programs, facilities, and employment opportunities. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. We encourage you to apply even if you only meet most of the requirements (but not 100% of the listed criteria) – we believe skills evolve over time. If you’re willing to learn and grow with us, we invite you to join our team!

Related Jobs

View all jobs

Information Security Engineer

Information Security Engineer

Information Security Engineer

Information Security Engineer

Information Security Engineer

Information Security Engineer - Vulnerability Management

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.