×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cyber Threat & Response Engineer; L3

Job in Austin, Travis County, Texas, 78716, USA
Listing for: 3M
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Cyber Threat & Response Engineer (L3)

Job Description

Cyber Threat & Response Engineer (L3)

Collaborate with Innovative 3

Mers Around the World

Choosing where to start and grow your career has a major impact on your professional and personal life, so it’s equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3

Mers.

This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.

The Impact You Will Make in this Role

Step into the front lines of cyber defense as a Cyber Threat & Response Engineer – Level 3, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you’ll hunt, analyze, and neutralize sophisticated attacks before they escalate.

In this role, you’ll bridge the gap between rapid triage and deep‑don' investigations. You will be expected to detect the undetectable, elevate with precision, and drive swift incident response to keep adversaries at bay.

We’re looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high‑stakes scenarios. If you’re ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:

Management
  • Own the front lines:
    Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
  • Investigate like a hunter:
    Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
  • Lead the charge:
    Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run.
  • Escalate with precision:
    Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
  • Close the loop:
    Support remediation during active incidents and contribute to post‑incident reviews to strengthen defenses and eliminate gaps.
Technical
  • Turn intel into action:
    Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
  • Engineer smarter defenses:
    Partner with detection engineering teams to design, test, and fine‑tune detection rules and use cases.
  • Analyze the unknown:
    Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
  • Stay ahead of the curve:
    Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
  • Bridge the gap:
    Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
  • Drive the process:
    Capture investigation steps, findings, and actions with clarity and precision for future reference.
  • Continuous improvement:
    Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary
  • Senior‑level expertise in leading complex investigations and responding to advanced cyber threats.
  • Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments.
  • Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors.
  • Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain.
  • Hands‑on experience with scripting languages (Python, Power Shell, Bash) to automate investigations, parse logs, and streamline incident response workflows.
  • Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC.
  • Experienced in coordinating incident response efforts and communicating findings to stakeholders.
  • Committed to continuous improvement of SOC processes, playbooks, and detection capabilities.
  • Strategic thinker with the ability to assess risk, lead…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary