Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
CYREBRO is on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization.
Our true 24/7/365 ML-backed Managed Detection & Response solution rapidly detects, analyzes, investigates and responds to cyber threats. From strategic monitoring to proactive threat hunting, accelerated incident response, and enhanced compliance, the full scope of needs is covered.
This way, both Fortune 500 companies and SMBs alike can equally and profoundly improve their security posture with clarity, simplicity, and cost-efficiency.
CYREBRO is the first interactive SOC Platform, transforming how today’s businesses respond to and mitigate cyber threats with a centralized security operations infrastructure. The platform provides complete clarity, insight, and real-time cyber recommendations for businesses of all sizes by integrating all of their security events into one central command.
We are seeking a Detection Engineer to join CYREBRO's Research team as a key contributor. In this role, you will analyze emerging threats and enhance the detection capabilities of our Security Data Lake (SDL). Combining threat research expertise with hands-on engineering skills, you will develop and maintain robust detection mechanisms. Collaborating closely with researchers, forensics specialists, and incident responders, you will conduct in-depth security event analysis and implement effective detection strategies.
Responsibilities:
Design, develop, and optimize threat detection rules for both new and existing data sources
Lead the integration of new data sources into our detection engine
Perform post-production analysis to tune and refine detection capabilities
Conduct thorough threat simulations and develop attack scenario POCs
Mentor junior team members and contribute to the team's technical growth
Maintain and improve existing detection capabilities
Collaborate with incident response teams to enhance detection accuracy
Requirements:
Minimum 3 years of experience in detection engineering, security research, threat research, or red team operations
Strong expertise in SIEM/XDR systems, with ability to architect detection solutions
Advanced SQL skills for complex query development and optimization
Deep understanding of domain environments, operating systems, and enterprise architecture
Proven experience with common security tools (EDR, IDS/IPS, WAF)
Demonstrated proficiency in cloud environments (GCP, AWS, Azure)
Experience with detection frameworks and tools (YARA, SIGMA, Snort, MITRE ATT&CK)
Desired Skills:
Programming proficiency in Python, PowerShell, or Go
Experience building automation frameworks for threat detection
Knowledge of threat hunting methodologies
Understanding of adversary tactics and techniques
Experience with threat intelligence integration
Ability to develop custom detection tools and scripts
Professional Qualities:
Strong analytical and problem-solving capabilities
Proven ability to document and communicate technical concepts
Demonstrated passion for cybersecurity with commitment to staying current
Experience mentoring junior team members
Strong project management and prioritization skills
Required profile
Experience
Level of experience:Mid-level (2-5 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.