Security Engineer, Detection Engineering

Saronic · Defense · Austin, TX · Software

Security Engineer focused on detection engineering, building and operating data pipelines for security telemetry, and developing automation playbooks. The role involves designing, building, testing, and tuning detection rules across various telemetry sources, mapping coverage to MITRE ATT&CK, and managing the detection lifecycle. It also includes engineering correlation rules, behavioral analytics, and anomaly-based detections, as well as building and maintaining pipelines for security telemetry ingestion, normalization, and enrichment using infrastructure-as-code practices. The role supports incident response and collaborates with other security teams.

What you'd actually do

  1. Design, build, test, and tune high-fidelity detection rules and analytic queries across endpoint, cloud, network, identity, and DLP telemetry sources
  2. Develop and maintain detection content using detection-as-code practices including version-controlled logic, automated testing, and CI/CD deployment
  3. Map detection coverage to MITRE ATT&CK, identify gaps, and prioritize new detection development based on threat intelligence and business risk
  4. Engineer correlation rules, behavioral analytics, and anomaly-based detections that minimize false positives while surfacing real adversary tradecraft
  5. Own the detection lifecycle from initial development through production tuning, performance monitoring, and retirement

Skills

Required

  • Detection engineering
  • Security operations
  • Security automation
  • SIEM platforms
  • SPL
  • KQL
  • Python
  • PowerShell
  • Go
  • Rust
  • Terraform
  • MITRE ATT&CK framework
  • Data engineering concepts
  • ETL pipelines
  • Data modeling
  • Schema design
  • Indexing
  • Log ingestion
  • Normalization
  • Enrichment
  • Data quality management

Nice to have

  • Defense
  • Aerospace
  • Robotics
  • Autonomy
  • High-assurance environments
  • EDR platforms
  • AWS
  • Microsoft 365/Azure
  • Incident response
  • Threat hunting
  • Adversary emulation
  • Embedded Linux
  • Operational technology
  • ICS telemetry
  • NIST SP 800-171
  • NIST SP 800-53
  • CMMC
  • GCIH
  • GCIA
  • GCDA
  • GSOM
  • OSDA
  • OSCP

What the JD emphasized

  • 3+ years of hands-on experience in detection engineering, security operations, security automation, or a closely related security engineering role
  • Demonstrated experience designing, testing, and tuning detection rules and analytic queries across production security telemetry (endpoint, cloud, network, identity, or DLP)
  • Hands-on experience with SIEM platforms and proficiency with query languages such as SPL, KQL, or equivalent
  • Experience building and operating security data pipelines, including log ingestion, normalization, enrichment, and data quality management
  • Understanding of data engineering concepts including ETL pipelines, data modeling, schema design, and indexing as applied to security telemetry
  • Hands-on coding experience in Python, PowerShell, Go, or Rust for security automation, detection tooling, or pipeline development, and familiarity with Terraform for managing detection and logging infrastructure as code
  • Understanding of MITRE ATT&CK framework and its application to detection coverage and gap analysis