Collaborate with Innovative 3Mers Around the World
Choosing where to start and grow your career has a major impact on your professional and personal life, so it’s equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a wide variety of people, global locations, technologies and products, 3M is a place where you can collaborate with other curious, creative 3Mers.
This position provides an opportunity to transition from other private, public, government or military experience to a 3M career.
The Impact You Will Make in this Role
Step into the front lines of cyber defense as a Cyber Threat & Response Engineer – Level 3, a pivotal role in safeguarding the 3M enterprise and industrial environments against evolving threats. This position is the heartbeat of our Cyber Defense Organization, where you’ll hunt, analyze, and neutralize sophisticated attacks before they escalate.
In this role, you’ll bridge the gap between rapid triage and deep-dive investigations. You will be expected to detect the undetectable, escalate with precision, and drive swift incident response to keep adversaries at bay. We’re looking for a sharp technical mind with an insatiable curiosity for threat patterns, a proactive approach to risk mitigation, and the ability to thrive in high-stakes scenarios. If you’re ready to engineer resilience, outsmart attackers, and elevate cyber defense to the next level, this is your arena. Here, you will make an impact by:
Management
Own the front lines: Monitor and dissect security alerts provided from managed services providers, SIEM, EDR, and advanced detection platforms to uncover potential threats before they strike.
Investigate like a hunter: Dive deep into suspicious activity, correlating signals across multiple sources to reveal scope, impact, and adversary intent.
Lead the charge: Drive containment, eradication, and recovery for low to moderately complex incidents—keeping attackers on the run.
Escalate with precision: Deliver detailed, actionable intelligence to senior engineers and management, ensuring rapid and effective resolution.
Close the loop: Support remediation during active incidents and contribute to post-incident reviews to strengthen defenses and eliminate gaps.
Technical
Turn intel into action: Apply threat intelligence, behavioral analytics, and contextual data to sharpen detection and response capabilities.
Engineer smarter defenses: Partner with detection engineering teams to design, test, and fine-tune detection rules and use cases.
Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats.
Stay ahead of the curve: Track evolving attacker tactics, techniques, and procedures (TTPs) and use that knowledge to outsmart adversaries.
Organizational
Bridge the gap: Work closely with IT, OT, and business units to validate alerts, gather context, and coordinate swift incident resolution.
Drive the process: Capture investigation steps, findings, and actions with clarity and precision for future reference.
Continuous improvement: Contribute to playbook enhancements, process improvements, and knowledge sharing.
Competency Summary
Senior-level expertise in leading complex investigations and responding to advanced cyber threats
Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments
Proficient in developing detection logic and tuning analytics to identify sophisticated attacker behaviors
Strong understanding of adversary TTPs and frameworks like MITRE ATT&CK and Cyber Kill Chain
Hands-on experience with scripting languages (Python, PowerShell, Bash) to automate investigations, parse logs, and streamline incident response workflows
Effective mentor and technical leader for junior analysts, fostering a culture of excellence in the SOC
Experienced in coordinating incident response efforts and communicating findings to stakeholders
Committed to continuous improvement of SOC processes, playbooks, and detection capabilities
Strategic thinker with the ability to assess risk, lead under pressure, and drive operational maturity
Your Skills and Expertise
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
High School diploma (completed and verified prior to start) and four (4) years of hands-on experience
AND
Five (5) years of experience in a SOC or cybersecurity operations role, with at least (2) two years in a senior or L3 capacity in a private, public, government or military environment
Additional qualifications that could help you succeed even further in this role include:
Proficiency in analyzing alerts from SIEM, EDR, and network monitoring tools
Familiarity with threat intelligence, advanced malware analysis, and log correlation techniques
Ability to write and use scripts (Python, PowerShell, Bash) for automation, log parsing, and incident response tasks
Understanding of common attack vectors, threat actor behaviors, and frameworks like MITRE ATT&CK
Strong analytical and problem-solving skills with attention to detail
Effective communicator with the ability to document investigations and collaborate with cross-functional teams
Certifications such as CompTIA Security+, CySA+, or GCIH
Work location: On site in Austin TX
Travel: May include up to 10% domestic and international
Relocation Assistance: Is Authorized
Must be legally authorized to work in country of employment without sponsorship for employment visa status (e.g., H1B status).
Supporting Your Well-being
3M offers many programs to help you live your best life – both physically and financially. To ensure competitive pay and benefits, 3M regularly benchmarks with other companies that are comparable in size and scope.
Chat with Max
For assistance with searching through our current job openings or for more information about all things 3M, visit Max, our virtual recruiting assistant on 3M.com/careers
Requirements
To set you up for success in this role from day one, 3M requires (at a minimum) the following qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, or technology field (completed and verified prior to start)
OR
High School diploma (completed and verified prior to start) and four (4) years of hands-on experience
AND
Five (5) years of experience in a SOC or cybersecurity operations role, with at least (2) two years in a senior or L3 capacity in a private, public, government or military environment
At 3M, our 93,000 employees do work that matters, applying our science in ways that make a positive impact on people’s lives around the globe. And that work is accomplished through close collaboration with smart, curious and motivated 3Mers in 87 countries, all rallying behind 3M’s vision:
3M technology advancing every company.
3M products enhancing every home.
3M innovation improving every life.
We use cookies on this site to enhance your experience. By using our website you accept our use of cookies.
Cookies
YourMembership uses cookies for your convenience and security. Cookies are text files stored on the browser of your computer and are used to make your experience on web sites more personal and less cumbersome. You may choose to decline cookies if your browser permits, but doing so may affect your ability to access or use certain features of this site. Please refer to your web browser's help function for assistance on how to change your preferences.