Security Engineer (Blue Team)

Techland

Job Summary

The Security Engineer (Blue Team) will be responsible for monitoring security telemetry and alerts across various systems, investigating suspicious activities, and supporting containment and remediation actions. This role involves correlating logs, threat intelligence, and behavioral signals to identify real threats and reduce noise. The engineer will work closely with an external SOC, develop and tune detection rules, participate in incident response, and collaborate with internal teams to strengthen defensive posture. They will also maintain detection playbooks and response guides.

Must Have

  • Solid experience in hands-on security operations
  • Familiarity with log sources and telemetry
  • Proficiency in using SIEM or EDR platform
  • Understanding of attack tactics and detection logic
  • Practical knowledge of operating systems
  • Analytical mindset and structured approach
  • Very good command of English

Good to Have

  • Experience with threat hunting
  • Exposure to cloud environments
  • Familiarity with SOAR platforms
  • Hands-on knowledge of scripting
  • Security certifications (GCIH, GCFA, etc.)

Perks & Benefits

  • Private medical care
  • Life insurance
  • Pro-health campaigns
  • Gifts for different occasions
  • Flexible working hours
  • Dedicated HR Business Partner support
  • Dedicated development budget
  • Two extra paid days for training and CSR
  • Stable career paths
  • Internal and external training
  • Financing of English and Polish language classes
  • Chillout zones in offices
  • Fully equipped kitchen
  • Gym (Wrocław office)
  • Free car park (Warsaw - limited space)

Job Description

Company Description

Techland is one of the biggest video game companies in Poland, with over 30 years of experience in the gaming industry. From our studios in Wrocław and Warsaw, we’ve built an international team of more than 500 talented professionals, all dedicated to pushing the boundaries of game development.

We’re known for creating iconic franchises like Call of Juarez and the zombie genre-defining Dying Light, which has been played by over 45 million players worldwide. With a focus on open-world action, storytelling, and community engagement, we’re committed to delivering unforgettable experiences to our players.

We’re constantly striving to improve, innovate, and take on new challenges. With ambitious plans for the future, we’re looking for passionate people to be part of this exciting journey.

Job Description

Your daily tasks:

  • Monitoring security telemetry and alerts across systems, endpoints, cloud and network infrastructure.

  • Investigating suspicious activities, triaging incidents and supporting containment and remediation actions.

  • Correlating logs, threat intel and behavioral signals to identify real threats and reduce noise.

  • Working closely with our external SOC to validate escalations, provide context and lead follow-up investigations.

  • Developing and tuning detection rules and use cases in SIEM and EDR platforms.

  • Supporting threat hunting and hypothesis-driven exploration of suspicious activity.

  • Participating in incident response lifecycle – documentation, RCA, lessons learned.

  • Collaborating with internal teams (IT, Cloud, Dev, Production) to strengthen defensive posture.

  • Maintaining detection playbooks, runbooks and response guides.

Qualifications

  • Solid experience in hands-on security operations, threat detection or incident response.

  • Familiarity with log sources and telemetry: authentication, endpoint, DNS, cloud, firewall, etc.

  • Proficiency in using at least one SIEM or EDR platform (e.g. Sentinel, Splunk, CrowdStrike, Qualys EDR).

  • Understanding of attack tactics (MITRE ATT&CK) and ability to map detection logic.

  • Practical knowledge of operating systems (Windows, GNU/Linux, macOS) from a security perspective.

  • Analytical mindset, curiosity and structured approach to problem-solving.

  • Very good command of English.

Nice to have:

  • Experience with threat hunting, purple teaming or custom rule development.

  • Exposure to cloud environments (AWS/GCP/Azure) and their security telemetry.

  • Familiarity with SOAR platforms and automated response logic.

  • Hands-on knowledge of scripting (e.g. Python, PowerShell, KQL, SPL).

  • Security certifications such as GCIH, GCFA, or MITRE ATT&CK Defender.

Additional Information

What we can offer:

  • A wide array of benefits: private medical care, life insurance, pro-health campaigns, gifts for different occasions.
  • An outstanding work atmosphere in a highly-skilled team of professionals, with flexible working hours, no dress code, and full support of the dedicated HR Business Partner.
  • Many opportunities for personal development: a dedicated development budget for each employee, extra two paid days for training and CSR, stable career paths, extensive internal and external training, and financing of English and Polish language classes.
  • State-of-the-art offices filled with chillout zones, a fully equipped kitchen, a gym (Wrocław office), and a free car park (Warsaw limited amount of space).

12 Skills Required For This Role

Budget Management Oops Storytelling Macos Dns Linux Incident Response Aws Azure Powershell Python Splunk

Similar Jobs