Job Description
We’re seeking a Senior Detection Engineer to lead the next evolution of AI-augmented threat detection.
This role goes beyond traditional detection engineering : you’ll help improve and build our Detection Engineering Agent, responsible for continuously grading and improving detection coverage based on a customer’s available telemetry, configuration, and behavioral baselines.
You’ll work across multi-cloud, hybrid, and data-lake environments to design modular detections that don’t depend on centralized data storage, but instead leverage federated queries, metadata scoring, and AI-based prioritization.
The ideal candidate combines deep hands-on SIEM expertise with a product mindset : able to design scalable detection pipelines, integrate AI feedback, and quantify detection efficacy at enterprise scale.
Key Responsibilities
- Design and maintain modular, high-fidelity detections using Sigma, KQL, SPL, Lucene, and other rule/query languages for Sentinel, Splunk, Chronicle, Elastic, and data-lake environments (Snowflake, BigQuery, Databricks).
-
- Build and evolve Detection Engineering Agent, enabling real-time tracking, grading, and ranking of a customer’s environment based on data coverage, signal quality, and rule performance.
-
- Develop detections that operate without centralized storage, leveraging federated queries, streaming analytics, and metadata summarization instead of raw data ingestion.
-
- Quantify coverage gaps across identity, endpoint, cloud, network, and SaaS telemetry; collaborate cross-functionally to enhance observability and threat visibility.
-
- Integrate AI and ML models for automated rule tuning, false positive reduction, and behavioral correlation.
-
- Implement feedback-driven rule lifecycle management, including performance tracking (TP/FP/FN), version control, and graceful rule deprecation or promotion.
-
- Collaborate with SOC, data science, and platform teams to continuously improve detection quality and automate enrichment or response actions via SOAR platforms.
-
Manage detection-as-code pipelines, ensuring CI/CD integration, modular content reuse, and full traceability of changes.
Required Skills
- 5+ years of experience in detection engineering, threat hunting, and SOC operations.
-
- Expertise in at least two major SIEMs (Sentinel, Google SecOps / Chronicle, Splunk) and data-lake query environments (Snowflake/ Databricks).
-
- Strong command of Sigma, KQL, SPL, or Lucene, with the ability to abstract detection logic into environment-agnostic templates.
-
- Experience with federated detection queries and data modeling for environments without long-term log storage.
-
- Familiarity with AI/ML-driven prioritization for detection scoring, clustering, or environment-based tuning.
-
- Ability to handle diverse telemetry: cloud (AWS/Azure/GCP), IAM, EDR, firewall, Windows event logs, network, and SaaS platforms.
-
- Experience in GitOps/detection-as-code workflows with version control, testing, and deployment pipelines.
-
- Excellent communication and documentation skills with a focus on translating technical detections into product-ready content.
Nice to Have
- Experience building or contributing to detection optimization or coverage grading frameworks.
-
- Scripting in Python or PowerShell for automation, enrichment, and testing.
-
- Familiarity with SOAR integration, purple teaming frameworks, and automated response orchestration.
-
- Background in AI/ML model feedback integration for detection scoring or prioritization.
Connect to me at rajeshwari.vh@careerxperts.com for more details.