Step into the front lines of cyber defense as a Cyber Threat & Response Engineer – Level 2, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you’ll hunt, analyze, and neutralize sophisticated attacks before they escalate. In this role, you’ll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay. We’re looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you’re ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by: Management Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike. Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent. Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run. Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution. Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps. Technical Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities. Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases. Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats. Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries. Organizational Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution. Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference. Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing. Competency Summary: Experienced in triaging and investigating security alerts across SIEM, EDR, and network platforms Skilled in correlating data from multiple sources to identify and escalate confirmed threats Proficient in supporting incident response efforts and conducting initial root cause analysis Strong understanding of threat intelligence and its application in operational workflows Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows Effective communicator with the ability to document investigations clearly and collaborate across teams Committed to continuous learning and development in threat detection and response Analytical thinker with a proactive approach to identifying and mitigating risks Reliable team player in a 24/7 SOC environment, contributing to operational excellence
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees