Security Engineer, Detection & Response

Robinhood Robinhood · Fintech · Ljubljana, Slovenia, Menlo Park, CA +1 · Security Division

Security Engineer role focused on detection and response within Robinhood's Security Operations team. Responsibilities include investigating security alerts, developing and tuning detection rules, analyzing security telemetry, monitoring threats, and contributing to automation efforts. Requires experience in security operations, detection engineering, or incident response, with skills in log analysis, alert tuning, and query languages for detection development.

What you'd actually do

  1. Investigate security alerts across SIEM, EDR, and cloud security platforms, perform log analysis, and coordinate containment or remediation steps with engineering partners
  2. Develop, test, and tune detection rules using query languages to improve signal quality and reduce false positives
  3. Correlate data from multiple telemetry sources to identify attack patterns and determine appropriate response actions
  4. Monitor emerging threats and update detection logic based on investigation findings and threat intelligence reporting
  5. Contribute to automation efforts by building or refining SOAR playbooks and scripts that improve investigation speed and consistency

Skills

Required

  • Security operations
  • Detection engineering
  • Incident response
  • Log analysis
  • SIEM
  • EDR
  • Cloud security tools
  • Query languages (SQL-like, KQL)
  • Threat hunting
  • Security telemetry analysis

Nice to have

  • SOAR playbook development
  • AWS security monitoring
  • Okta security monitoring
  • Kubernetes security monitoring
  • Google Workspace security monitoring
  • Software development for detection and response tooling
  • Agentic workflows
  • Generative AI optimization

What the JD emphasized

  • 2–4 years of experience in security operations, detection engineering, or incident response
  • Experience analyzing logs and tuning alerts within SIEMs, EDR platforms, and cloud security tools
  • Experience writing detections using query languages (e.g., SQL-like, KQL, or similar)
  • Familiarity with threat hunting and investigation techniques across cloud and endpoint environments
  • Ability to analyze security telemetry, identify patterns of malicious activity, and recommend practical improvements