Job Description
Minimum Qualifications
6+ years in security engineering, detection engineering, or cloud security with exposure to SaaS and API-based environments. Strong expertise in anomaly detection, behavioural analytics, and applied data science concepts for cybersecurity. Hands-on experience with SIEM, SOAR, and detection-as-code frameworks (., Splunk, OpenSearch, KQL, Sigma). Proficiency in threat hunting methodologies, adversary emulation, and detection in large-scale SaaS/cloud environments. Familiarity with threat intelligence platforms (TIPs), enrichment pipelines, and ATT&CK-based intelligence mapping. Good programming, automation, and data analytics skills. Experience integrating detection pipelines into SaaS applications and microservices. Preferred Qualifications
Experience developing analytics pipelines, including AI/ML models for anomaly detection and risk scoring. Exposure to SOC operations, detection content development, and adversary simulation. Deep knowledge of threat intelligence tradecraft (., ATT&CK, Sigma mappings, enrichment, correlation with detection rules). Experience with automated detection tuning and false positive reduction. Familiarity with cloud-native telemetry pipelines. Security certifications: GIAC GCDA/GCFA, GCTI, GCP Security Engineer, AWS Security Specialty, OSCP. 1. SaaS Detection Research & Engineering
Develop and refine detection frameworks for SaaS-specific threats (business logic abuse, API misuse, identity-based attacks). Engineer detection-as-code pipelines leveraging Sigma, OpenSearch, and automation frameworks. Incorporate AI/ML-driven anomaly detection techniques where applicable. Continuously reskill and upskill in emerging detection technologies. 2. Proactive Security Controls & Mitigations
Implement preventive and adaptive controls to identify SaaS threats before exploitation. Use automation and analytics (including AI-enhanced methods) to accelerate response and reduce MTTD/MTTR. Collaborate with detection and response teams to improve coverage and resilience. 3. Threat Hunting & Intelligence Integration
Conduct advanced threat hunting across SaaS telemetry, using both traditional and AI-assisted approaches. Leverage threat intelligence feeds and enrichment pipelines to drive prioritization. Map detection coverage to MITRE ATT&CK and adversary playbooks. Automate ingestion, normalization, and correlation of structured/unstructured TI data. 4. Risk-Based Detection & Security Metrics
Build risk-based prioritization models, incorporating AI/ML where beneficial. Provide executive reporting on detection performance, coverage, and efficiency. Quantify detection efficacy by aligning outcomes with business risk and threat impact. 5. Continuous Reskilling & Innovation
Lead reskilling initiatives within Detection Engineering, enabling the team to adopt new frameworks, AI/ML methods, and automation. Collaborate with data science teams to explore AI-supported detection content generation and validation. Foster a culture of continuous learning and applied innovation in DE, TH, and TI. Career Level - IC4
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application