Information security specialist, detection and response engineer
Confidential
Posted: February 6, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
Designs, implements, and optimizes threat detection capabilities, investigates security incidents, and ensures compliance through robust monitoring and documentation.
Required Skills
Job Description
Are you passionate about cutting-edge technology and eager to make a meaningful impact on the digitalization of society?
At CSC, we offer unparalleled growth opportunities, a supportive and inclusive environment, and the chance to work on the future of research and learning. Join us today!
We are now looking for an information security specialist in the role of detection and response engineer. The Detection Engineer designs, implements, and optimizes threat detection capabilities, investigates security incidents, and ensures compliance through robust monitoring and documentation.
Our team is responsible for guiding and overseeing security at CSC. This includes security management as well as information security, facility security, and personnel security.
We develop centralized security capabilities and governance models. We are a growing group where expertise and professionalism are at the core of what we do.
In this role, you will help secure supercomputers, AI environments, national cloud service production, and other critical infrastructure that most people only read about in LinkedIn posts. We are looking for someone with a university degree in a relevant field—such as security, computer science, cybersecurity, IT, or another technical discipline—and solid experience in information security. You should have strong hands-on expertise in security monitoring and incident investigation.
Your key responsibilities will be to:
• Design and maintain detection logic (SIEM, EDR/XDR, SOAR) by creating and fine-tuning rules and integrating threat intelligence.
• Ensure SOC has the right visibility: develop log collection strategies and validate data quality.
• Act as technical counterpart for SOC: review detection use cases, validate alerts, and recommend improvements.
• Investigate escalated incidents from SOC for deeper analysis and coordinate remediation with internal teams.
• Support compliance through audit-ready documentation and participation in risk assessments.
• Contribute to automation and integration initiatives to enhance detection and monitoring capabilities.