Threat Detection Engineer

Windsor
1 month ago
Create job alert

Join Centrica's IT Security Team as a Threat Detection Engineer! 🚀

Are you ready to play your part in driving the UK's energy transformation? Centrica is looking for a passionate and skilled Threat Detection Engineer to join our dynamic IT Security team. If you're excited about developing, automating, and improving detection capabilities to effectively identify and respond to security threats, this is the perfect opportunity for you!

Location: Remote working with occasional travel to our Windsor office.

Key Responsibilities:

Implement and manage the Detection Engineering framework across our infrastructure.

Develop and maintain consistent, scalable, and effective detection capabilities.

Continuously assess and improve detection logic and use cases.

Automate detection engineering workflows using GitOps and CI/CD principles.

Build and optimize security playbooks for detection, threat hunting, and incident response.

Enhance threat detection and response capabilities, including Azure Logic Apps.

Collaborate with security analysts and stakeholders to address incident response gaps.

Stay updated on current threat intelligence, trends, TTPs, and vulnerabilities.

Skills Required:

Experience with detection rules (KQL) and frameworks like MITRE ATT&CK.

Proficiency in PowerShell, Python, or Go for security use cases.

Hands-on experience with infrastructure as code tools (Terraform, Ansible, Puppet).

Strong understanding of Azure and AWS cloud platforms.

Familiarity with GitOps concepts and CI/CD workflows.

Experience with security automation platforms (SOAR) and orchestration playbooks.

Background in Security Operations and Cyber Security Incident Response.

Education:

Bachelor's degree preferred (but not essential) in IT, Computer Science, Information Systems, or related field. Relevant experience will be considered in lieu of qualifications.

Why Join Us?

Be part of a team that supports sustainable energy solutions and delivers impactful projects. Your contributions will make a real difference!

Benefits:

Competitive salary and bonus potential.

Car allowance

Employee Energy Allowance at 15% of the government price cap.

Pension scheme.

Company-funded healthcare plan.

25 days holiday allowance, plus public holidays, with the option to buy up to 5 additional days.

A range of flexible benefits, including technology vouchers, an electric car lease scheme, and travel insurance.

Ready to make an impact? Apply now and join us in shaping the future of energy! 🌟

#LI-PR1

Related Jobs

View all jobs

Security Automation and Detection Engineer

Cloud security engineer

IT Infrastructure Analyst

Lead SOC Analyst

Security Architect

SOC Shift Lead

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.