Job description
 
                         We’re seeking a  Senior Detection Engineer  to lead the next evolution of AI-augmented threat detection.
This role goes beyond traditional detection engineering : you’ll help improve and build our  Detection Engineering Agent , responsible for continuously grading and improving detection coverage based on a customer’s available telemetry, configuration, and behavioral baselines.
You’ll work across  multi-cloud ,  hybrid , and  data-lake  environments to design modular detections that don’t depend on centralized data storage, but instead leverage federated queries, metadata scoring, and AI-based prioritization.
The ideal candidate combines  deep hands-on SIEM expertise  with a  product mindset  : able to design scalable detection pipelines, integrate AI feedback, and quantify detection efficacy at enterprise scale.
Key Responsibilities
Design and maintain modular, high-fidelity detections  using Sigma, KQL, SPL, Lucene, and other rule/query languages for Sentinel, Splunk, Chronicle, Elastic, and data-lake environments (Snowflake, BigQuery, Databricks).
Build and evolve Detection Engineering Agent , enabling real-time tracking, grading, and ranking of a customer’s environment based on data coverage, signal quality, and rule performance.
Develop detections that operate without centralized storage , leveraging federated queries, streaming analytics, and metadata summarization instead of raw data ingestion.
Quantify coverage gaps  across identity, endpoint, cloud, network, and SaaS telemetry; collaborate cross-functionally to enhance observability and threat visibility.
Integrate AI and ML models  for automated rule tuning, false positive reduction, and behavioral correlation.
Implement feedback-driven rule lifecycle management , including performance tracking (TP/FP/FN), version control, and graceful rule deprecation or promotion.
Collaborate with SOC, data science, and platform teams  to continuously improve detection quality and automate enrichment or response actions via SOAR platforms.
Manage detection-as-code pipelines , ensuring CI/CD integration, modular content reuse, and full traceability of changes.
Required Skills
5+ years of experience in  detection engineering, threat hunting, and SOC operations .
Expertise in  at least two major SIEMs  (Sentinel, Google SecOps / Chronicle, Splunk) and  data-lake query environments  (Snowflake/ Databricks).
Strong command of  Sigma, KQL, SPL, or Lucene , with the ability to abstract detection logic into environment-agnostic templates.
Experience with  federated detection queries  and  data modeling  for environments without long-term log storage.
Familiarity with  AI/ML-driven prioritization  for detection scoring, clustering, or environment-based tuning.
Ability to handle diverse telemetry:  cloud (AWS/Azure/GCP), IAM, EDR, firewall, Windows event logs, network, and SaaS platforms.
Experience in  GitOps/detection-as-code workflows  with version control, testing, and deployment pipelines.
Excellent communication and documentation skills with a focus on translating technical detections into product-ready content.
Nice to Have
Experience building or contributing to  detection optimization or coverage grading frameworks .
Scripting in  Python or PowerShell  for automation, enrichment, and testing.
Familiarity with  SOAR integration ,  purple teaming frameworks , and  automated response orchestration .
Background in  AI/ML model feedback integration  for detection scoring or prioritization.
Connect to me at rajeshwari.vh@careerxperts.com for more details.
 
                    
                    
Required Skill Profession
 
                     
                    
                    Computer Occupations