This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Activision is seeking a Senior Detection and Response Engineer to help protect our players, studios, platforms, and enterprise environments from advanced cyber threats. As part of our Global Security Operations organization, this role is responsible for actively identifying, investigating, and responding to security threats. This role is highly hands-on and focuses on real-world attacker behavior, rapid analysis, and effective containment.
Job Responsibility:
Detect, investigate, and respond to security incidents across cloud, corporate, and production environments
Monitor and analyze security telemetry and audit logs to identify anomalous activity
Perform alert triage, in‑depth investigation, and forensic analysis across the full incident lifecycle
Execute endpoint, identity, cloud, and malware investigations
Develop, refine, and tune threat detections within the SIEM
Enhance investigation and response efficiency through automation, SOAR workflows, scripting, and advanced analytics
Contribute to TDIR procedures, playbooks, runbooks, documentation, and operational metrics
Collaborate closely with engineering teams, business stakeholders, and vendors
Participate in an on‑call rotation and provide off‑hours support
Communicate investigation findings clearly and effectively
Some travel might be required
Requirements:
Bachelor’s degree in computer science, Information Security, or equivalent practical experience
5+ years of progressively accountable experience
Hands‑on experience in threat detection, security operations, and incident response
Strong understanding of the modern threat landscape, attacker tactics, techniques, and procedures
Proven ability to detect, triage, investigate, and respond to security incidents in enterprise environments
Experience performing detailed log analysis, correlation, and investigative triage
Strong written and verbal communication skills
Ability to work independently and collaboratively
Willingness to participate in an on‑call rotation and provide off‑hours support
Fluency in English
Nice to have:
8+ years of relevant IT and security experience
Experience working with security monitoring platforms such as SIEM, EDR
Strong host‑ and network‑based forensic skills
Hands‑on malware analysis experience using static and dynamic techniques
Scripting or programming experience (e.g., Python, PowerShell, KQL)
Experience implementing or operating SOAR platforms and security automation
Experience using AI/ML‑driven analytics for alert enrichment, anomaly detection, or automated investigations
Understanding foundational security best practices
Ability to assess incidents quickly, recommend effective response actions, and mitigate risk
Experience interfacing effectively with leadership, engineering teams, and external vendors
Demonstrated engagement with the cybersecurity community or strong evidence of self‑driven learning
What we offer:
Medical, dental, vision, health savings account or health reimbursement account, healthcare spending accounts, dependent care spending accounts, life and AD&D insurance, disability insurance
401(k) with Company match, tuition reimbursement, charitable donation matching
Paid holidays and vacation, paid sick time, floating holidays, compassion and bereavement leaves, parental leave
Mental health & wellbeing programs, fitness programs, free and discounted games, and a variety of other voluntary benefit programs like supplemental life & disability, legal service, ID protection, rental insurance, and others