Are you a seasoned Security Engineer with a passion for safeguarding digital environments and defending against emerging cyber threats? We are seeking a highly skilled and motivated Senior Information Security Engineer to strengthen our security posture across multiple domains in Lahore.
In this role, you will design, operate, and continuously enhance the organization’s detection,
response, and security architecture. The position blends blue team operations with red team
thinking, enabling proactive identification of weaknesses, improvement of detection capabilities,
and effective response to advanced threats across cloud, email, endpoint, identity, and
network environments.
As a Senior Information Security Engineer, you will play a critical role in ensuring the highest
levels of security and compliance for both our organization and our clients.
Key Responsibilities:
• Collaborate closely with engineering, infrastructure, and compliance teams on security
aspects of operating systems, databases, access controls, patch management, encryption,
antivirus, and vulnerability management.
• Design, build, deploy, monitor, and maintain security systems, owning assigned
initiatives end-to-end.
• Clearly communicate complex cybersecurity risks, threats, and impacts to senior
management.
• Provide architectural security guidance to infrastructure, operations, data, and network
teams during implementation and production phases.
• Build and maintain strong working relationships with management, peers, project
managers, and internal stakeholders.
• Translate threat intelligence into actionable security controls across platforms, including
endpoint, email, IAM, patch management, firewalls, IPS, malware detection, and alerting
systems.
• Lead high-severity incident response efforts, including in-depth investigations, malware
analysis, and correlation of user activity with network traffic.
• Conduct post-incident root cause analysis from an attacker’s perspective.
• Perform adversary emulation and attack simulations aligned with the MITRE ATT&CK
framework.
• Validate security controls by simulating red-team techniques such as credential theft,
lateral movement, privilege escalation, persistence, and living-off-the-land techniques.
• Map detections to MITRE ATT&CK techniques and improve detection coverage.
• Partner with the SOC to identify and close detection gaps.
• Mentor junior security engineers and SOC analysts.
• Influence security tooling decisions and long-term security roadmap.
The Ideal Candidate Will Have:
• In-depth experience with the Microsoft 365 ecosystem, including endpoint, email, cloud
security, and threat hunting.
• Expertise in Identity and Access Management (IAM), Identity Governance,
Conditional Access, IdP, PIM, JIT access, and Single Sign-On (SSO) implementations.
• Comprehensive understanding of logging, event management, SOC operations, incident
management, host isolation, and containment strategies.
• Hands-on experience with Microsoft Sentinel automation, orchestration, data connectors,
analytics rules, and Kusto Query Language (KQL).
• Experience integrating threat intelligence feeds with SIEM platforms.
• Strong hands-on experience with endpoint security tools such as Microsoft Defender for
Endpoint (MDE), Intune, and JAMF.
• Expertise in system hardening and Intune policy and compliance configurations.
• Network Detection and Response (NDR) experience (preferred).
• Skills in network segmentation, firewall rule reviews, and packet analysis (e.g.,
Wireshark).
• Familiarity with KnowBe4, including security awareness training and phishing
simulations.
• Strong understanding of cloud security across Azure, AWS, and GCP, including
assessment and remediation.
• Expertise in email security, including Microsoft Exchange, SMTP/MAPI protocols,
header analysis, and phishing detection.
• Expertise in email security including Microsoft exchange and header analysis for Phishing,
suspicious email attachment and detection of other threats.
• Hands-on experience with vulnerability management lifecycle using industry reputable
tools such Tenable, Rapid7, Qualys etc. With understanding of Common Vulnerability
Scoring System (CVSS) scoring on exploitability and remediation strategies.
• Hands-on with red-teaming tools to execute attack and breach simulations that mimic the
specific threat actors to test detection and response capabilities.
• Good reporting and debriefing skills to translate complex technical findings into actionable
reports for stakeholders and collaborate with blue teams to improve defenses.
Education & Qualifications:
• Bachelor’s degree in an IT-related discipline.
• Minimum 5 years of experience in security engineering, SOC operations, or detectionfocused roles.
• Relevant technical cybersecurity certifications are a plus.