Security Engineer - Threat Detection

Stripe Stripe · Fintech · Ireland · 8611 Security Analytics

Security Engineer role focused on threat detection within a fintech company. Responsibilities include designing, building, and maintaining detections, conducting threat hunts, performing malware analysis, and building automation for detection engineering at scale. Requires experience with SIEM platforms, understanding of attacker TTPs, and proficiency in detection logic and programming.

What you'd actually do

  1. Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle
  2. Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry
  3. Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls
  4. Perform malware analysis and reverse engineering to extract indicators and inform detection strategies
  5. Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS

Skills

Required

  • detection engineering
  • threat hunting
  • security operations
  • SIEM platforms
  • attacker TTPs
  • threat intelligence analysis
  • network security
  • endpoint security
  • cloud security telemetry
  • log analysis
  • detection/query languages (SPL, KQL, EQL, YARA-L, SQL)
  • Python
  • adversarial mindset

Nice to have

  • fintech security
  • financial services security
  • regulated environments
  • malware analysis
  • reverse engineering
  • threat research
  • purple team operations
  • big data platforms (Databricks, Trino, PySpark)
  • AI/LLM-assisted development tools
  • agentic automation
  • detection validation tools (Atomic Red Team, ATT&CK Evaluations)
  • open-source contributions
  • certifications (HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, GREM)

What the JD emphasized

  • 5+ years of experience in detection engineering, threat hunting, or security operations
  • Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)
  • Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration
  • Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities
  • Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)
  • Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources
  • Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)
  • Adversarial mindset — understanding how attackers operate to build detections that catch real-world threats