Senior Information Security Engineer - IS Mod

Mayo ClinicRochester, MN
Hybrid

About The Position

The Senior Information Security Engineer (Threat Hunt) proactively hunts for and validates adversary activity across endpoint, identity, network, cloud, and application telemetry, and supports high-severity incident investigations to determine scope and impact. Translates successful hunts and threat intelligence into scalable detections and monitoring (e.g., SIEM/XDR correlation rules, alert logic, scheduled queries, and dashboards) and continuously tunes them to reduce noise while improving coverage. Leverages automation and Artificial Intelligence platforms to accelerate hunt development, enrich investigative context, prioritize high-value leads, and improve the efficiency and scale of threat hunting workflows. Applies deep knowledge of attacker tradecraft and TTPs across the cyber kill chain, including IOC management, tracking, and hypothesis-driven hunting. Success in the role requires strong data and automation skills (e.g., KQL/Splunk SPL/Yara-L plus PowerShell/Python) and hands-on experience with platforms such as Microsoft Sentinel and Microsoft Defender XDR or comparable SIEM/XDR tools. Partners closely with incident response, detection engineering, security testing (purple teaming/adversary emulation), vulnerability management, and threat intelligence to communicate clear findings, risk, confidence, and recommended next steps and drive work to closure. This role participates in security operations on-call rotations and periodic incident-handler rotations to support active investigations and maintain response readiness. Work may occasionally require after-hours engagement during high-severity incidents or vulnerability response activities. The incumbent also assists system users relative to information systems security matters and undertakes complex projects requiring additional specialized technical knowledge. Specifically, the Information Security Senior Engineer is knowledgeable, proficient, and experienced in: • Working with business partners within the department to achieve organizational and OIS goals • Developing required competencies by mastering fundamental tasks • Independently analyzing technology security posture and appropriate use of security defenses • Matching technical solutions with business requirements and then designing and implementing them; • Self-directed software development, testing, support/problem solving, and overall technology administration; • Organizational procedures such as the system development life-cycle; • Use of defensive measures and information to identify, analyze and report security events; • Researching and understanding pertinent information technology laws, policies and procedures • Establishing timelines and delivery of requirements • Applying IT-related laws and policies, and providing IT-related guidance throughout the software acquisition lifecycle • Collecting and analyzing information to identify vulnerabilities and potential for exploitation • Managing and administering processes and tools that enable the organization to identify, document, and access intellectual capital and information content • Executing duties governing hardware, software, and information system acquisition programs and other program management policies with minimal support

Requirements

  • Strong data and automation skills (e.g., KQL/Splunk SPL/Yara-L plus PowerShell/Python).
  • Hands-on experience with platforms such as Microsoft Sentinel and Microsoft Defender XDR or comparable SIEM/XDR tools.
  • Deep knowledge of attacker tradecraft and TTPs across the cyber kill chain, including IOC management, tracking, and hypothesis-driven hunting.
  • Knowledgeable, proficient, and experienced in working with business partners within the department to achieve organizational and OIS goals.
  • Knowledgeable, proficient, and experienced in developing required competencies by mastering fundamental tasks.
  • Knowledgeable, proficient, and experienced in independently analyzing technology security posture and appropriate use of security defenses.
  • Knowledgeable, proficient, and experienced in matching technical solutions with business requirements and then designing and implementing them.
  • Knowledgeable, proficient, and experienced in self-directed software development, testing, support/problem solving, and overall technology administration.
  • Knowledgeable, proficient, and experienced in organizational procedures such as the system development life-cycle.
  • Knowledgeable, proficient, and experienced in the use of defensive measures and information to identify, analyze and report security events.
  • Knowledgeable, proficient, and experienced in researching and understanding pertinent information technology laws, policies and procedures.
  • Knowledgeable, proficient, and experienced in establishing timelines and delivery of requirements.
  • Knowledgeable, proficient, and experienced in applying IT-related laws and policies, and providing IT-related guidance throughout the software acquisition lifecycle.
  • Knowledgeable, proficient, and experienced in collecting and analyzing information to identify vulnerabilities and potential for exploitation.
  • Knowledgeable, proficient, and experienced in managing and administering processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
  • Knowledgeable, proficient, and experienced in executing duties governing hardware, software, and information system acquisition programs and other program management policies with minimal support.

Nice To Haves

  • Experience with continuous tuning of detections to reduce noise while improving coverage.
  • Experience with Artificial Intelligence platforms to accelerate hunt development, enrich investigative context, prioritize high-value leads, and improve the efficiency and scale of threat hunting workflows.

Responsibilities

  • Proactively hunts for and validates adversary activity across endpoint, identity, network, cloud, and application telemetry.
  • Supports high-severity incident investigations to determine scope and impact.
  • Translates successful hunts and threat intelligence into scalable detections and monitoring (e.g., SIEM/XDR correlation rules, alert logic, scheduled queries, and dashboards) and continuously tunes them to reduce noise while improving coverage.
  • Leverages automation and Artificial Intelligence platforms to accelerate hunt development, enrich investigative context, prioritize high-value leads, and improve the efficiency and scale of threat hunting workflows.
  • Applies deep knowledge of attacker tradecraft and TTPs across the cyber kill chain, including IOC management, tracking, and hypothesis-driven hunting.
  • Partners closely with incident response, detection engineering, security testing (purple teaming/adversary emulation), vulnerability management, and threat intelligence to communicate clear findings, risk, confidence, and recommended next steps and drive work to closure.
  • Participates in security operations on-call rotations and periodic incident-handler rotations to support active investigations and maintain response readiness.
  • Assists system users relative to information systems security matters.
  • Undertakes complex projects requiring additional specialized technical knowledge.
  • Works with business partners within the department to achieve organizational and OIS goals.
  • Develops required competencies by mastering fundamental tasks.
  • Independently analyzes technology security posture and appropriate use of security defenses.
  • Matches technical solutions with business requirements and then designs and implements them.
  • Performs self-directed software development, testing, support/problem solving, and overall technology administration.
  • Applies knowledge of organizational procedures such as the system development life-cycle.
  • Uses defensive measures and information to identify, analyze and report security events.
  • Researches and understands pertinent information technology laws, policies and procedures.
  • Establishes timelines and delivery of requirements.
  • Applies IT-related laws and policies, and provides IT-related guidance throughout the software acquisition lifecycle.
  • Collects and analyzes information to identify vulnerabilities and potential for exploitation.
  • Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
  • Executes duties governing hardware, software, and information system acquisition programs and other program management policies with minimal support.

Benefits

  • Competitive compensation
  • Comprehensive benefit plans
  • Medical: Multiple plan options.
  • Dental: Delta Dental or reimbursement account for flexible coverage.
  • Vision: Affordable plan with national network.
  • Pre-Tax Savings: HSA and FSAs for eligible expenses.
  • Retirement: Competitive retirement package to secure your future.
  • Continuing education and advancement opportunities

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service