Cyber Security Engineer job opportunity at Quantexa.



Date2026-02-05T15:25:30.231Z bot
Quantexa Cyber Security Engineer
Experience: 8-years
Pattern: Full-time
apply Apply Now
Salary:
Status:

Job

Copy Link Report
degreeAssociate
loacation London, United Kingdom
loacation London....United Kingdom

What we’re all about.  Do you ever have the urge to do things better than the last time? We do. And it’s this urge that drives us every day. Our environment of discovery and innovation means we’re able to create deep and valuable relationships with our clients to create real change for them and their industries. It’s what got us here – and it’s what will make our future. At Quantexa, you’ll experience autonomy and support in equal measures allowing you to form a career that matches your ambitions. 41% of our colleagues come from an ethnic or religious minority background. We speak over 20 languages across our 50+nationalities, creating a sense of belonging for all.   We're heading in one direction, the future. We’d love you to join us.   The opportunity. The Cyber Security Engineer is a very hands-on operational role within the Security Operations team, playing a key part in protecting Quantexa. The role is responsible for the day-to-day operation, optimisation, and monitoring of core security platforms, with a particular focus on Zscaler, Cloud monitoring through Wiz and Endpoint Detection and Response through CrowdStrike.  Working closely with the wider Security Operations, you will ensure that security alerts, findings, and detections are promptly triaged, accurately validated, logged and effectively remediated. The role contributes directly to improving Quantexa’s security posture by reducing risk, strengthening detection capability, and supporting timely response to security events.  This position is well suited to a very technical, curious and observant practitioner who enjoys working inside key security tooling, values disciplined execution and can operate confidently within established processes while identifying opportunities for continuous improvement.  What you’ll be doing.  Wiz (Cloud Security Posture Management)  Monitor and triage Wiz findings daily, validating alerts and determining operational impact.  Performing tuning and threat hunting within Wiz and other tooling  Identify misconfigurations, excessive permissions, and exposed assets, escalating where required.  Track remediation progress with engineering owners and ensure closure of highpriority issues.  Zscaler (Web Security Tunnel 2.0)  Review and triage Zscaler alerts and policy violations, following documented response procedures.  Investigate suspicious traffic, access attempts, and user activity to determine legitimacy and risk.  Support enforcement actions by validating policy alignment and working with IT and Cloud teams to remediate issues.  Monitor coverage and configuration across users and locations, identifying gaps or misconfigurations.  Support policy tuning by analysing false positives and recommending rule or policy adjustments.  Contribute to playbook development, operational maturity, and ongoing service readiness.  CrowdStrike (Endpoint Detection and Response)  Review and triage endpoint detections, applying documented response steps.  Execute containment actions, including network isolation and sensor troubleshooting.  Validate full sensor coverage across the estate and address gaps in coordination with IT.  Support tuning activities by analysing false positives and proposing rule refinements.  Contribute to playbook improvements and operational readiness tasks.  Security Operations  Conduct initial investigation of security incidents, collect evidence, and escalate based on severity with a keen eye on the quality of the output.  Perform daily review of alerts across our SIEM, Wiz, CrowdStrike, and other platforms.  Validate vulnerabilities and configuration weaknesses raised by scanning tools.  Ability to interpret and operationalise threat intelligence, understand how it informs detection, prioritisation, and response activities, and clearly communicate technical threat intelligence to non-technical stakeholders.  Support cloud security controls, identity hygiene checks, and network policy reviews.  Contribute to the ongoing maturity and documentation of operational processes.  Collaboration and Ways of Working  Act as a trusted operational partner to the Cyber Security Manager and the wider Information Security team, providing proactive support and consistent engagement.  Partner closely with DevOps, IT, and Engineering teams to drive timely and effective remediation actions.  Deliver clear and concise updates on incidents and operational activities proactively, without the need for prompting.  Actively participate in team stand ups, contributing constructively to continuous improvement and operational maturity.  Support senior engineers with platform enhancements, integrations, and controlled change activities.  What you'll bring. Required: Demonstrated hands-on experience with security operations, incident triage, or vulnerability management.  Familiarity with EDR platforms (ideally CrowdStrike) and security telemetry analysis.  Knowledge of cloud environments, particularly Azure including Entra and Conditional Access, and a good understanding of cloud security concepts.  Ability to understand alert context, assess impact, and follow structured response processes.  Strong attention to detail, disciplined documentation, and good communication skills.  Mandatory Proficiency in the Following Platforms: Practical experience with core security platforms, including Wiz for cloud posture and workload visibility, CrowdStrike for endpoint detection and response, and Zscaler for secure access and traffic inspection.  Familiarity with insiderrisk and secretdetection tooling, such as CyberHaven and GitGuardian, with the ability to support basic investigations and configuration checks.  Working knowledge of CI/CD pipelines and DevOps tooling, including the ability to follow established security checks within delivery workflows.  Exposure to native cloud security services (e.g. Azure Security Centre, GCP Security Command Centre) for posture review, alert triage, and configuration validation.  Education & Certifications: Minimum of 8 years of professional experience in cybersecurity  Master’s degree in information security, Computer Science, or related discipline.  Preferred Industry Certifications (Evidence required): GIAC certifications such as GCIA, GCED, GCIH, GDAT, GDSA or GMON, Microsoft Certified Identity and Access Administrator Associate (SC 300), Microsoft Certified Security Operations Analyst Associate (SC 200)  Expectations and Mindset: Proactiveness: Take initiative, seek out information, do not sit back and wait, drive your own knowledge alongside that of other guidance provided by the team, and always ask questions.  Communication: Keep stakeholders informed, ask questions, and ensure clarity in all interactions.  Forward thinking: Anticipate challenges and issues, try to think one step ahead, think strategically, and look for opportunities for improvement.  Team Communication: Follow up with the team and make sure you are seen and known, be heard and build strong relationships and establish your presence. 

Other Ai Matches

Technology Account Partner - North America Applicants are expected to have a solid experience in handling Job related tasks
Solution Architect Applicants are expected to have a solid experience in handling Job related tasks
Data Engineer Applicants are expected to have a solid experience in handling Job related tasks
Solution Architect Applicants are expected to have a solid experience in handling Job related tasks
Principal Product Manager - Channel & Ecosystem Applicants are expected to have a solid experience in handling Job related tasks
Cyber Security Engineer Applicants are expected to have a solid experience in handling Job related tasks
Solution Engineer - Japan Applicants are expected to have a solid experience in handling Job related tasks
Finance Manager Applicants are expected to have a solid experience in handling Job related tasks
Sales Director, Insurance (Software sales) - USA Applicants are expected to have a solid experience in handling Insurance (Software sales) - USA related tasks
Legal Counsel Applicants are expected to have a solid experience in handling Job related tasks
Sales Director - Banking - USA Applicants are expected to have a solid experience in handling Job related tasks
Director, public sector - Benelux - Sales - Belgium Applicants are expected to have a solid experience in handling public sector - Benelux - Sales - Belgium related tasks
Head of Procure-to-Pay (P2P) Applicants are expected to have a solid experience in handling Job related tasks
Backend Software Engineer Applicants are expected to have a solid experience in handling Job related tasks
Technical Project Manager Applicants are expected to have a solid experience in handling Job related tasks
Product Manager, Decisioning & Risk (12-month Parental leave cover) Applicants are expected to have a solid experience in handling Decisioning & Risk (12-month Parental leave cover) related tasks
Sales Director, Insurance (Software sales) - USA Applicants are expected to have a solid experience in handling Insurance (Software sales) - USA related tasks
Delivery Manager (Secret II Clearance) Applicants are expected to have a solid experience in handling Job related tasks
Solutions Engineer (pre-sales) - Banking Applicants are expected to have a solid experience in handling Job related tasks
Technology Account Partner - North America Applicants are expected to have a solid experience in handling Job related tasks
Scala Engineer Applicants are expected to have a solid experience in handling Job related tasks
Head of Fraud Solutions - APAC Applicants are expected to have a solid experience in handling Job related tasks
Sales Director, Insurance (Software sales) - USA Applicants are expected to have a solid experience in handling Insurance (Software sales) - USA related tasks