Security Engineering Manager

Information Technology

Job Reference



Information Technology


Business Professionals


Warsaw, Poland



The role

The Security Engineering team is responsible for supporting our Security Operations team by leading the configuration, selection, maintenance and development of essential security technologies that continue to mature our ability to detect, investigate and mitigate threats across the firm and technology estate. Working with service owners and other operational teams to provide technical SME expertise to mitigate threats posed by malicious actors and vulnerabilities.

This role forms a critical part of the Cyber Security function and will work closely with key functions across Security Operations, Security Architecture, Cloud Centre of Excellence (CCoE), IT Operations and DevOps teams.

We are seeking a highly skilled and experienced Security Engineering Manger to join our team and support our strategy to enhance, design and deliver our security solutions, while providing hands on technical leadership and guidance to the Security Engineering team.


  • Supports the research, designs and implementation of cyber security solutions for the firm that comply with all applicable security policies and standards.
  • Support the review and update of cyber security roadmaps, architectures, standards and baselines that underpin our cyber security solutions.
  • Maintain integrity and security of cloud based infrastructure and software by working closely with our Security Operations Team, resolving security-related incidents, monitoring vulnerabilities, applying patches & configuration changes as recommended or as required.
  • Strategic planning to maintain the firms portfolio of technical security controls (SIEM, Logging & Monitoring, EDR, Case Management and SOAR platform, Vulnerability Management, Identity Services, Network Sensors).
  • Works with Security Operations, IT and internal and external business stakeholders to ensure that security is factored into the evaluation, selection, installation and configuration process of technology and software.
  • Analyses and makes recommendations to improve network, system and application architectures.
  • Support threat hunting / modelling and incident response activities with research and analysis.
  • Support audits conducted by internal teams, third parties, and customers, confirming our robust security solution stack.
  • Contribute to the planning and execution of all security testing to assess the effectiveness of current controls to ensure continuous improvement.
  • Provide expert guidance in the technical governance forums.
  • Support the ongoing development of our Vulnerability management programme.
  • Keep up to date with evolving InfoSec trends, emerging risks, and growing industry-wide technological shifts
  • Actively test the effectiveness of current controls to ensure continuous improvement.
  • Support the Security Operations team and Technical SMEs during all stages of the Incident Response Process.
  • Contribute towards the broader company strategy, to push it in a more secure direction from a development perspective.
  • Further develop the secure application development lifecycle, integrating security tooling early into the continuous delivery pipeline, shifting ‘security left’. Configure, troubleshoot and maintain security infrastructure software.
  • Assist the Security Operations team with ad-hoc technical security enquiries. 




  • Proven experience with wide range of security tools, platforms and services including SIEM, Logging and Monitoring, EDR/MDR, Vulnerability Detection, DLP, Insider Threat, Network Sensors (IDS/IPS/WAF/honeypots).
  • Experience of Cyber Security within Azure including the Azure security tools.
  • Understand attack lifecycles and techniques with working knowledge of MITRE ATT&CK.
  • Strong knowledge of networking, system administration and operating systems.
  • Experience with modern cloud technologies and service providers would be desirable; specifically Azure platform, Containers and Serverless, Java, Node JS, relational and NoSQL DB’s
  • Experience in integrating software vulnerability management processes and the associated tools including Jira, dynamic & static code analysis, cloud posture scanning and vulnerability scanning.
  • Technical expertise in network security knowledge, to include VPN, firewall, network monitoring, intrusion detection, web server security and wireless security, cloud.
  • Practical experience with database security, content filtering, vulnerability scanning and anti-malware
  • Proficiency with at least one scripting language (e.g., Perl, Python and PowerShell).
  • Strong knowledge of common vulnerabilities and exploitation techniques.
  • Experience with SAST, DAST, vulnerability and pen testing products.
  • Knowledge of vulnerability risk assessments, threat modelling, and using tools to support secure software development.
  • Expert problem-solving skills in the fields of security engineering, operations and architecture, with the ability to research issues thoroughly.


The following demonstrable experience is desired:


  • 5+ years’ experience
  • Security requirements, analysis, product selection and implementation, solution and tooling development. Public cloud platforms (Azure, GCP, AWS)
  • Identity & Access management
  • Network & Endpoint security
  • Logging, Monitoring & Retention
  • Threat intelligence, Automation & Orchestration
  • Configuration & Vulnerability management



DLA Piper is a global law firm with lawyers and business service professionals located in more than 40 countries throughout the Americas, Europe, the Middle East, Africa and Asia Pacific. Our global reach ensures that we can help businesses with their legal needs anywhere in the world. We strive to be the leading global business law firm by delivering quality, service excellence and value to our clients and offering practical and innovative legal solutions to help them succeed. Our clients range from multinational, Global 1000, and Fortune 500 enterprises to emerging companies developing industry-leading technologies, as well as government and public sector bodies.



In everything we do connected with our People, our Clients and our Communities, we live by these values:

• Be Supportive – we are compassionate and inclusive, valuing diversity and acting thoughtfully

• Be Collaborative – we are proactive, passionate team players investing in our relationships

• Be Bold – we are fearless and inquisitive, challenging ourselves to think big and find creative new solutions

• Be Exceptional – we are strategic and driven, exceeding standards and expectations




At DLA Piper, diversity and inclusion underpins how we live our values and everything we do. We believe that everyone has a voice, and that everyone’s voice counts. We know that the rich diversity across our firm makes us stronger, more innovative and creative, which helps us to better serve our clients and communities. We are committed to providing an inclusive working environment and culture across our global firm, where everyone can bring their authentic self to work.


Diversity of perspective, thought, background and culture combine to make us the leading global law firm; that’s why we actively seek to build balanced teams. We welcome the unique contribution that you will bring to our firm and actively encourage applications from all talented people – however your talent is packaged, whatever your background or circumstance and regardless of how you identify.




We recognise that people have responsibilities and interests outside of their career and that as a business, we all benefit from working flexibly. That’s why we are open to discussing with candidates the different ways in which we are able to support requests for agile working arrangements.




In the event that we make an offer to you, and where local legislation permits and where relevant, we will conduct pre-engagement screening checks that may include but are not limited to your professional and academic qualifications, your eligibility to work in the relevant jurisdiction, any criminal records, your financial stability and work-related references.