Senior Detection Creation Engineer

Apple Apple · Big Tech · Seattle, WA · Software and Services

This role focuses on building security detections to protect Apple's systems and services by analyzing attacker behaviors and implementing detection logic in Scala Spark and on-host detection systems. It involves understanding threat landscapes, collaborating with engineering teams, and tuning detections.

What you'd actually do

  1. Develop security detections that identify active malicious activity across Apple’s services and infrastructure, implementing detection logic in Scala Spark (Databricks) and on-host detection frameworks (Falco rules)
  2. Analyze attacker behaviors and translate them into observable patterns across diverse telemetry sources including system call events, network logs, database access logs, endpoint security telemetry, Kubernetes audit logs, and other security-relevant data sources
  3. Collaborate with engineering teams to understand system architectures, identify detection opportunities, and develop detections that are both high-fidelity and operationally sustainable
  4. Tune and optimize detections based on real-world alert data, reducing false positives while maintaining coverage of malicious behaviors
  5. Operationalize detections by working with security operations teams to ensure alerts are actionable, triaged efficiently, and integrated into incident response workflows

Skills

Required

  • security detection
  • threat hunting
  • incident response
  • penetration testing
  • red teaming
  • programming language fundamentals
  • analyzing security telemetry data

Nice to have

  • Scala
  • Python
  • Apache Spark
  • Databricks
  • Falco
  • Linux system internals
  • network protocols
  • web application security
  • container/Kubernetes security
  • cloud infrastructure
  • system call traces
  • network traffic analysis
  • application logs
  • database audit logs
  • cloud provider audit logs
  • evasion techniques
  • open-source security projects
  • detection tuning methodologies

What the JD emphasized

  • security detection
  • threat hunting
  • incident response
  • penetration testing
  • red teaming
  • attacker behaviors
  • malicious activity
  • detection logic
  • telemetry data
  • high-fidelity detections
  • detection code
  • attacker tradecraft
  • defensive capabilities
  • security-relevant data sources
  • false positives
  • incident response workflows
  • detection engineering