Security Engineer, Detection & Response

Robinhood Robinhood · Fintech · Ljubljana, Slovenia, Menlo Park, CA +1 · Security Division

Security Engineer focused on detection and response within a financial technology company. Responsibilities include investigating security alerts, developing and tuning detection rules, analyzing security telemetry, monitoring emerging threats, and contributing to automation efforts. Requires experience in security operations, detection engineering, or incident response, with proficiency in SIEM, EDR, and cloud security tools, and experience writing detections using query languages.

What you'd actually do

  1. Investigate security alerts across SIEM, EDR, and cloud security platforms, perform log analysis, and coordinate containment or remediation steps with engineering partners
  2. Develop, test, and tune detection rules using query languages to improve signal quality and reduce false positives
  3. Correlate data from multiple telemetry sources to identify attack patterns and determine appropriate response actions
  4. Monitor emerging threats and update detection logic based on investigation findings and threat intelligence reporting
  5. Contribute to automation efforts by building or refining SOAR playbooks and scripts that improve investigation speed and consistency
  6. Document incidents and contribute to post-incident reviews with clear findings and recommended improvements to detection and response processes

Skills

Required

  • security operations
  • detection engineering
  • incident response
  • SIEM
  • EDR
  • cloud security tools
  • query languages (SQL-like, KQL)
  • threat hunting
  • log analysis
  • communication skills

Nice to have

  • SOAR playbooks
  • AWS
  • Okta
  • Kubernetes
  • Google Workspace security monitoring
  • software development for detection and response tooling
  • Agentic workflows
  • Generative AI

What the JD emphasized

  • 2–4 years of experience in security operations, detection engineering, or incident response
  • Experience analyzing logs and tuning alerts within SIEMs, EDR platforms, and cloud security tools
  • Experience writing detections using query languages (e.g., SQL-like, KQL, or similar)
  • Familiarity with threat hunting and investigation techniques across cloud and endpoint environments
  • Ability to analyze security telemetry, identify patterns of malicious activity, and recommend practical improvements
  • Clear written and verbal communication skills when documenting incidents and collaborating with technical teams