Senior Detection Creation Engineer

Apple Apple · Big Tech · Seattle, WA · Software and Services

This role focuses on developing security detections to identify and protect against malicious activity across Apple's services and infrastructure. The engineer will analyze attacker behaviors, translate them into observable patterns using various telemetry sources, and implement detection logic in Scala Spark and on-host detection systems. The role involves tuning detections, operationalizing them with security operations teams, and documenting the logic. While not strictly an AI/ML role, it involves analyzing complex data patterns to build security systems.

What you'd actually do

  1. Develop security detections that identify active malicious activity across Apple’s services and infrastructure, implementing detection logic in Scala Spark (Databricks) and on-host detection frameworks (Falco rules)
  2. Analyze attacker behaviors and translate them into observable patterns across diverse telemetry sources including system call events, network logs, database access logs, endpoint security telemetry, Kubernetes audit logs, and other security-relevant data sources
  3. Collaborate with engineering teams to understand system architectures, identify detection opportunities, and develop detections that are both high-fidelity and operationally sustainable
  4. Tune and optimize detections based on real-world alert data, reducing false positives while maintaining coverage of malicious behaviors
  5. Operationalize detections by working with security operations teams to ensure alerts are actionable, triaged efficiently, and integrated into incident response workflows

Skills

Required

  • security detection
  • threat hunting
  • incident response
  • penetration testing
  • red teaming
  • understanding of real attacker behaviors, tactics, and techniques
  • programming fundamentals
  • Scala
  • Python
  • Java
  • Go
  • analyzing security telemetry data

Nice to have

  • Scala Spark
  • Databricks
  • Falco
  • Linux system internals
  • network protocols
  • web application security
  • container/Kubernetes security
  • cloud infrastructure
  • system call traces
  • endpoint detection and response (EDR) data
  • network traffic analysis
  • application logs
  • database audit logs
  • cloud provider audit logs
  • evasion techniques
  • open-source security projects
  • detection engineering at scale
  • false positive rates
  • detection tuning methodologies

What the JD emphasized

  • deep security intuition
  • technical implementation skills
  • think like an attacker
  • understanding of real attacker behaviors, tactics, and techniques
  • analyzing security telemetry data to identify malicious activity or anomalous behaviors