We’re seeking a Senior Detection Engineer to lead the next evolution of AI-augmented threat detection.
This role goes beyond traditional detection engineering : you’ll help improve and build our Detection Engineering Agent , responsible for continuously grading and improving detection coverage based on a customer’s available telemetry, configuration, and behavioral baselines.
You’ll work across multi-cloud , hybrid , and data-lake environments to design modular detections that don’t depend on centralized data storage, but instead leverage federated queries, metadata scoring, and AI-based prioritization.
The ideal candidate combines deep hands-on SIEM expertise with a product mindset : able to design scalable detection pipelines, integrate AI feedback, and quantify detection efficacy at enterprise scale.
Key Responsibilities
- Design and maintain modular, high-fidelity detections using Sigma, KQL, SPL, Lucene, and other rule / query languages for Sentinel, Splunk, Chronicle, Elastic, and data-lake environments (Snowflake, BigQuery, Databricks).
- Build and evolve Detection Engineering Agent , enabling real-time tracking, grading, and ranking of a customer’s environment based on data coverage, signal quality, and rule performance.
- Develop detections that operate without centralized storage , leveraging federated queries, streaming analytics, and metadata summarization instead of raw data ingestion.
- Quantify coverage gaps across identity, endpoint, cloud, network, and SaaS telemetry; collaborate cross-functionally to enhance observability and threat visibility.
- Integrate AI and ML models for automated rule tuning, false positive reduction, and behavioral correlation.
- Implement feedback-driven rule lifecycle management , including performance tracking (TP / FP / FN), version control, and graceful rule deprecation or promotion.
- Collaborate with SOC, data science, and platform teams to continuously improve detection quality and automate enrichment or response actions via SOAR platforms.
Manage detection-as-code pipelines , ensuring CI / CD integration, modular content reuse, and full traceability of changes.
Required Skills
5+ years of experience in detection engineering, threat hunting, and SOC operations .Expertise in at least two major SIEMs (Sentinel, Google SecOps / Chronicle, Splunk) and data-lake query environments (Snowflake / Databricks).Strong command of Sigma, KQL, SPL, or Lucene , with the ability to abstract detection logic into environment-agnostic templates.Experience with federated detection queries and data modeling for environments without long-term log storage.Familiarity with AI / ML-driven prioritization for detection scoring, clustering, or environment-based tuning.Ability to handle diverse telemetry : cloud (AWS / Azure / GCP), IAM, EDR, firewall, Windows event logs, network, and SaaS platforms.Experience in GitOps / detection-as-code workflows with version control, testing, and deployment pipelines.Excellent communication and documentation skills with a focus on translating technical detections into product-ready content.Nice to Have
Experience building or contributing to detection optimization or coverage grading frameworks .Scripting in Python or PowerShell for automation, enrichment, and testing.Familiarity with SOAR integration , purple teaming frameworks , and automated response orchestration .Background in AI / ML model feedback integration for detection scoring or prioritization.Connect to me at rajeshwari.vh@careerxperts.com for more details.