<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>5c943be1-a6f</externalid>
      <Title>Threat Detection Engineer</Title>
      <Description><![CDATA[<p>We are seeking an experienced Threat Detection Engineer to join our team. As a Threat Detection Engineer, you will be responsible for driving our best-in-class posture through threat hunting, detection engineering, and playbook creation. You will also lead information security response activities and work closely with business and technology teams to deliver positive outcomes.</p>
<p>Key responsibilities include:</p>
<ul>
<li>Leveraging multiple data sources to identify modern evolving threats and developing new detection and response approaches</li>
<li>Creating and operating high-fidelity detections mechanisms that drive efficient, effective, and repeatable response</li>
<li>Owning, operating, and automating detection and response workflows to enable the team to focus on strategic objectives</li>
<li>Leading information security response activities for the firm</li>
<li>Working across business and technology teams to deliver positive outcomes across the firm</li>
</ul>
<p>Requirements include:</p>
<ul>
<li>A bachelor&#39;s or master&#39;s degree in computer science or cyber security with a strong IT background or equivalent demonstrable experience</li>
<li>3 years&#39; experience working in a security engineering role, with financial industry experience preferred</li>
<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>
<li>Possession of security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>
<li>Experience with modern security tooling across security domains; network, endpoint, data, identity, and cloud</li>
<li>Experience in standard enterprise technology stack, including Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>
<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>
<li>Required scripting, development, and automation skills using PowerShell or Python and proficient development tools</li>
<li>Experience in OSINT, threat hunting, and analysing malicious emails</li>
<li>Ability to prioritise in a fast-moving, high-pressure, constantly changing environment</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>threat detection, security engineering, cyber security, KQL, SQL, SPL, security certifications, modern security tooling, standard enterprise technology stack, scripting, development, automation, OSINT, threat hunting</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>IT Infrastructure</Employername>
      <Employerlogo>https://logos.yubhub.co/mlp.eightfold.ai.png</Employerlogo>
      <Employerdescription>IT Infrastructure provides IT services and support to various organisations.</Employerdescription>
      <Employerwebsite>https://mlp.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://mlp.eightfold.ai/careers/job/755955470563</Applyto>
      <Location>London, United Kingdom</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>b6fdfd50-5de</externalid>
      <Title>Threat Detection Engineer</Title>
      <Description><![CDATA[<p>Do you have a passion for hunting malicious activities in the background of business as usual and figuring out how to detect and respond to new threats?</p>
<p>Millennium SOC is looking for an experienced Threat Detection Engineer to drive our best-in-class posture.</p>
<p>This is a highly technical role, and successful candidates will have demonstrable knowledge and experience across a range of business and security technologies within a fast-paced organisation.</p>
<p><strong>Principal Responsibilities</strong></p>
<ul>
<li>Identify modern evolving threats and develop new detection and response approaches</li>
<li>Create and operate high-fidelity detections mechanisms that drive efficient, effective and repeatable response</li>
<li>Own, operate and automate detection and response workflows, that enable the team to focus on strategic objectives</li>
<li>Lead Information Security response activities for the firm</li>
<li>Work across business and technology teams to deliver positive outcomes across the firm</li>
<li>Explain complex technology and information security related concepts to a wide range of stakeholders</li>
<li>Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering stakeholder queries</li>
<li>Monitor new and emerging security and privacy related technologies, trends, issues, and solutions and assess their applicability to Millennium key business initiatives and business strategies</li>
<li>Ensure Millennium Information Security capabilities remain fit for purpose and evolve to meet the changing threat landscape</li>
</ul>
<p><strong>Qualifications/Skills Required</strong></p>
<ul>
<li>Bachelor or master’s degree in computer science or cyber security with strong IT background or equivalent demonstrable experience</li>
<li>3 years’ experience working in a security engineering role, financial industry experience preferred</li>
<li>Experience in creating detections in modern query languages (KQL, SQL, SPL)</li>
<li>Possesses security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH)</li>
<li>Experience with modern security tooling across security domains; network, endpoint, data, identity and cloud</li>
<li>Experience in standard enterprise technology stack, Active Directory, Entra, Group Policy, Intune, DNS, TCP/IP, PKI, Microsoft 365, Windows, Linux, MacOS, etc.</li>
<li>Ability to handle sensitive and/or confidential materials with appropriate discretion</li>
<li>Required scripting, development and automation skills using PowerShell or Python and proficient development tools</li>
<li>Experience in OSINT, Threat hunting and analysing malicious emails</li>
<li>Able to prioritise in a fast moving, high pressure, constantly changing environment</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Bachelor or master’s degree in computer science or cyber security, 3 years’ experience working in a security engineering role, Experience in creating detections in modern query languages (KQL, SQL, SPL), Possesses security certifications (Security+, OSCP, CISSP, CEH, GCIA, GCIH), Experience with modern security tooling across security domains; network, endpoint, data, identity and cloud</Skills>
      <Category>IT</Category>
      <Industry>Finance</Industry>
      <Employername>IT Infrastructure</Employername>
      <Employerlogo>https://logos.yubhub.co/mlp.eightfold.ai.png</Employerlogo>
      <Employerdescription>IT Infrastructure is a company that provides infrastructure services.</Employerdescription>
      <Employerwebsite>https://mlp.eightfold.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://mlp.eightfold.ai/careers/job/755954323758</Applyto>
      <Location>Miami, Florida, United States of America</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
    <job>
      <externalid>55d2bc34-fc1</externalid>
      <Title>CyberSecurity Engineer, SOC Analyst</Title>
      <Description><![CDATA[<p>About Mistral AI
At Mistral AI, we believe in the power of AI to simplify tasks, save time, and enhance learning and creativity. Our technology is designed to integrate seamlessly into daily working life.</p>
<p>Role Summary
Mistral AI is looking for a Security Operations Center (SOC) Analyst to monitor, defend and respond to threats across our rapidly evolving AI ecosystem. You will treat security telemetry as the core of our active defense. Your objective is to ensure the continuous security of our diverse environment, spanning IT, Engineering, Science, Compute and Infrastructure by building robust detection mechanisms and moving swiftly from alert to automated response.</p>
<p>Responsibilities
• Partner with engineering and platform teams to ensure the comprehensive centralization of security logs across all Mistral environments.
• Design, test, and continuously tune high-fidelity alert scenarios and correlation rules to detect anomalous behavior while minimizing alert fatigue.
• Operationalize Cyber Threat Intelligence (CTI), monitoring the landscape for threats specific to AI and cloud infrastructure, and integrating actionable intel directly into our detection pipelines.
• Conduct rigorous, deep-dive investigations into security alerts, tracking root causes, identifying potential lateral movement, and determining impact.
• Drive the lifecycle of security incidents from containment to remediation, and coordinate cross-functional crisis management during high-severity events.</p>
<p>About You
• 3+ years of experience in a Security Operations Center (SOC), Incident Response, or Threat Hunting role, ideally within a cloud-native or fast-paced tech environment.
• Deep understanding of the threat landscape, the MITRE ATT&amp;CK framework, and the methodologies required to protect high-value infrastructure and intellectual property.
• Strong experience writing complex queries (e.g., KQL, Splunk SPL, or similar) and leveraging SIEM platforms to build out correlation rules and detection logic.
• Ability to write practical automation scripts in Python or Go to interact with security APIs, enrich alert context, and streamline response workflows.
• Proven experience participating in or leading incident response efforts, demonstrating a calm, methodical approach to high-pressure crisis management.</p>
<p>Hiring Process
• Introduction call - 30 min
• Hiring Manager interview - 30 min
• Technical Rounds - Dee-Dive interview - 55 min - Panel interview - 1h15
• Culture-fit discussion - 30 min
• References</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>onsite</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Security Operations Center (SOC), Incident Response, Threat Hunting, KQL, Splunk SPL, SIEM platforms, Python, Go, security APIs, alert context, response workflows</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI is an AI company that provides high-performance, optimized, open-source and cutting-edge models, products and solutions. Its comprehensive AI platform meets enterprise needs, whether on-premises or in cloud environments.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/f9782b09-ca3c-4bfc-ba7a-349551ef9a82</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>ce201584-893</externalid>
      <Title>Software Engineer III</Title>
      <Description><![CDATA[<p>We&#39;re looking for a Software Engineer III to join our team. As a Software Engineer III, you will be responsible for administering and scaling Perforce Helix Core, troubleshooting syncs, changelists, stream access, queues, and replication delays, supporting users of all technical levels with source control issues, analysing Perforce logs and infrastructure telemetry to resolve system issues, tuning and maintaining Linux servers across VM, bare metal, and cloud environments, automating systems using Ansible or similar tools, contributing to CI/CD pipelines for both internal tooling and game teams, building dashboards and alerts with KQL, Grafana, or similar observability tools, and extending and maintaining the .NET-based Perforce management application.</p>
<p><strong>What you&#39;ll do</strong></p>
<ul>
<li>Administer and scale Perforce Helix Core (commit/edge servers, replication, streams)</li>
<li>Troubleshoot syncs, changelists, stream access, queues, and replication delays</li>
<li>Support users of all technical levels with source control issues (p4 sync, p4 unlock, etc.)</li>
<li>Analyse Perforce logs and infrastructure telemetry to resolve system issues</li>
<li>Tune and maintain Linux servers across VM, bare metal, and cloud environments</li>
<li>Automate systems using Ansible or similar tools (Terraform optional)</li>
<li>Contribute to CI/CD pipelines for both internal tooling and game teams</li>
<li>Build dashboards and alerts with KQL, Grafana, or similar observability tools</li>
<li>Extend and maintain the .NET-based Perforce management application</li>
</ul>
<p><strong>What you need</strong></p>
<ul>
<li>5+ years of Linux (tuning, mounting, troubleshooting, scripting)</li>
<li>3+ years of DevOps automation with tools like Ansible, Terraform, or similar</li>
<li>3+ years with client-server source control systems (e.g., Perforce, ClearCase); Perforce preferred</li>
<li>Strong understanding of source control commands and workflows(p4 sync, changelists, streams, queues)</li>
<li>Experience analysing logs and resolving infrastructure-level issues</li>
<li>Familiarity with VM, bare metal, and cloud infrastructure in scaled environments</li>
<li>2+ years of .NET full stack (C#, ASP.NET, HTML/JavaScript)</li>
<li>Experience with CI/CD pipeline systems</li>
<li>Proficiency with monitoring tools such as KQL, Grafana, or equivalent</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>Linux, DevOps automation, client-server source control systems, source control commands and workflows, log analysis, infrastructure-level issues, .NET full stack, CI/CD pipeline systems, monitoring tools, Ansible, Terraform, Perforce, ClearCase, KQL, Grafana</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Electronic Arts</Employername>
      <Employerlogo>https://logos.yubhub.co/jobs.ea.com.png</Employerlogo>
      <Employerdescription>Electronic Arts creates next-level entertainment experiences that inspire players and fans around the world. Here, everyone is part of the story. Part of a community that connects across the globe. A place where creativity thrives, new perspectives are invited, and ideas matter. A team where everyone makes play happen.</Employerdescription>
      <Employerwebsite>https://jobs.ea.com</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.ea.com/en_US/careers/JobDetail/Software-Engineer-III/211769</Applyto>
      <Location>Orlando, Florida</Location>
      <Country></Country>
      <Postedate>2026-01-01</Postedate>
    </job>
  </jobs>
</source>