3M
Job Description
Cyber Threat & Response Engineer (L3)
Collaborate with Innovative 3Mers Around the World
Choosing where to start and grow your career has a major impact on your professional and personal life, so it’s equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role Step into the front lines of cyber defense as a Cyber Threat & Response Engineer – Level 3, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you’ll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you’ll bridge the gap between rapid triage and deep‑don' investigations. You will be expected to detect the undetectable, elevate with precision, and drive swift incident response to keep adversaries at bay.
We’re looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high‑stakes scenarios. If you’re ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run.
Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
Close the loop: Support remediation during active incidents and contribute to post‑incident reviews to strengthen defenses and eliminate gaps.
Technical
Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine‑tune detection rules and use cases.
Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary
Senior‑level expertise in leading complex investigations and responding to advanced cyber threats.
Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments.
Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors.
Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain.
Hands‑on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows.
Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC.
Experienced in coordinating incident response efforts and communicating findings to stakeholders.
Committed to continuous improvement of SOC processes, playbooks, and detection capabilities.
Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity.
Your Skills and Expertise To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start).
High School diploma (completed and verified prior to start) and four (4) years of hands‑on experience.
Five (5) years of experience in a SOC or cybersecurity operations role, with at least two (2) years in a senior or L3 capacity in a private, public, government or military environment.
Additional qualifications that could help you succeed even further in this role include:
Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools.
Familiarity with threat intelligence, advanced malware analysis, and log correlation techniques.
Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks.
Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK.
Strong analytical and problem‑solving skills with attention to detail.
Effective communicator with the ability to document investigations and collaborate with cross‑functional teams.
Certifications such as CompTIA Security+, CySA+, or GCIH.
Work location: On site in Austin TX
Travel:
May include up to 10%
domestic and international
Relocation Assistance:
Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well‑being
3M offers many programs to help you live your best life – both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Important Note Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review.
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
#J-18808-Ljbffr
Collaborate with Innovative 3Mers Around the World
Choosing where to start and grow your career has a major impact on your professional and personal life, so it’s equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role Step into the front lines of cyber defense as a Cyber Threat & Response Engineer – Level 3, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you’ll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you’ll bridge the gap between rapid triage and deep‑don' investigations. You will be expected to detect the undetectable, elevate with precision, and drive swift incident response to keep adversaries at bay.
We’re looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high‑stakes scenarios. If you’re ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run.
Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
Close the loop: Support remediation during active incidents and contribute to post‑incident reviews to strengthen defenses and eliminate gaps.
Technical
Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine‑tune detection rules and use cases.
Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary
Senior‑level expertise in leading complex investigations and responding to advanced cyber threats.
Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments.
Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors.
Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain.
Hands‑on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows.
Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC.
Experienced in coordinating incident response efforts and communicating findings to stakeholders.
Committed to continuous improvement of SOC processes, playbooks, and detection capabilities.
Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity.
Your Skills and Expertise To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start).
High School diploma (completed and verified prior to start) and four (4) years of hands‑on experience.
Five (5) years of experience in a SOC or cybersecurity operations role, with at least two (2) years in a senior or L3 capacity in a private, public, government or military environment.
Additional qualifications that could help you succeed even further in this role include:
Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools.
Familiarity with threat intelligence, advanced malware analysis, and log correlation techniques.
Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks.
Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK.
Strong analytical and problem‑solving skills with attention to detail.
Effective communicator with the ability to document investigations and collaborate with cross‑functional teams.
Certifications such as CompTIA Security+, CySA+, or GCIH.
Work location: On site in Austin TX
Travel:
May include up to 10%
domestic and international
Relocation Assistance:
Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well‑being
3M offers many programs to help you live your best life – both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Important Note Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly.
3M Global Terms of Use and Privacy Statement Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms.
Please access the linked document by clicking here, select the country where you are applying for employment, and review.
3M does not discriminate in hiring or employment on the basis of race, color, sex, national origin, religion, age, disability, veteran status, or any other characteristic protected by applicable law.
#J-18808-Ljbffr