3M-logo
3M
·
December 20, 2025
Apply Now
This job has closed.

Cyber Threat & Response Engineer (L2)

Austin, TX
Full-time
Onsite
$165K/yr - $201K/yr
Entry, Mid Level
3M is a global company that fosters collaboration among innovative individuals. They are seeking a Cyber Threat & Response Engineer (L2) to safeguard the enterprise against evolving cyber threats by monitoring security alerts, investigating suspicious activities, and driving incident response efforts.
Apply Now

Responsibilities

  • Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike
  • Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent
  • Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run
  • Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution
  • Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps
  • Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities
  • Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases
  • Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats
  • Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries
  • Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution
  • Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference
  • Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing

Qualification

Required

  • Bachelor's degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
  • OR High School diploma (completed and verified prior to start) and four (4) years of hands-on experience (completed and verified prior to start)
  • AND Two (2) years of experience in a SOC or cybersecurity operations role in a private, public, government or military environment

Preferred

  • Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
  • Familiarity with threat intelligence, basic malware analysis, and log correlation techniques
  • Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
  • Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
  • Strong analytical and problem-solving skills with attention to detail
  • Effective communicator with the ability to document investigations and collaborate with cross-functional teams
  • Certifications such as CompTIA Security+, CySA+, or GCIH

Benefits

  • Medical
  • Dental & Vision
  • Health Savings Accounts
  • Health Care & Dependent Care Flexible Spending Accounts
  • Disability Benefits
  • Life Insurance
  • Voluntary Benefits
  • Paid Absences
  • Retirement Benefits
3M is a global company that applies science to life, offering products and solutions across various industries.
Glassdoor
3.8
Founded in 1902
Saint Paul, Minnesota, USA
10001+ employees
https://www.3m.com
3M is a global company that applies science to life, offering products and solutions across various industries.
Glassdoor
3.8
Founded in 1902
Saint Paul, Minnesota, USA
10001+ employees
https://www.3m.com