Threat Detection Engineer

Workday Workday · Enterprise · USA.VA.Reston

This role focuses on advanced threat detection within Workday's Active Defense team. The engineer will develop and refine alerting logic, create adaptive and AI-assisted detection capabilities using behavioral baselines and entity-level context, and perform threat hunting and offensive security exercises. The role requires experience in security analytics, detection engineering, software development (Python), and public cloud environments, with a focus on applying AI and automation to improve threat detection and response.

What you'd actually do

  1. perform data and detection gap analysis and then use this information to develop and refine alerting logic while applying innovative techniques on large volumes of real-time data
  2. develop adaptive and AI-assisted detection capabilities that use behavioral baselines, entity-level context, and automation to support detection development, detection validation, threat hunting, and pre-production alert baselining
  3. collaborate with a large cross-section of teams across Workday to understand the threat landscape
  4. participate in various threat hunting and offensive security exercises to discover potential vulnerabilities and test detection coverage

Skills

Required

  • 2+ years of experience analyzing security logs, building or maintaining detection logic, and translating threat intelligence, attacker behavior, or incident learnings into practical detections
  • 2+ years of experience in a general-purpose programming language like Python, Java, Kotlin, Scala, or JavaScript to build effective detection tools
  • Developing, securing, and monitoring applications in public cloud environments
  • BS or MS degree in Computer Science, Engineering, or equivalent practical experience

Nice to have

  • Leverage the MITRE ATT&CK framework to identify and hunt for threats based on IOCs and IOAs
  • Experience developing or applying agents, automation, or workflow orchestration to improve detection engineering, detection validation, threat hunting, or pre-production alert baselining outcomes
  • Experience using AI-based discovery and exploit creation tools to mimic adversary capabilities
  • Experience with networking and Linux operating systems
  • Understanding of containerized applications and associated security challenges
  • Familiarity with behavior anomaly detection, entity-level baselines, outlier detection, clustering, and forecasting techniques
  • Experience with SIEM platforms such as Splunk and Elasticsearch
  • Familiarity with CI/CD pipelines and the Software Development Lifecycle (SDLC)

What the JD emphasized

  • Security analytics and detection engineering experience
  • Software development expertise
  • AI-assisted detection development
  • Offensive security

Other signals

  • AI-assisted detection capabilities
  • behavioral baselines
  • entity-level context
  • automation to support detection development
  • threat hunting
  • offensive security exercises
  • MITRE ATT&CK framework