The Role
As a Detection Engineer Cloud SME, you will design and implement detection mechanisms for cyber threats, collaborate with analysts, and maintain detection tools in a CSSP environment.
Summary Generated by Built In
Cyber Security Analyst III, Detection Engineer Cloud SME
North Charleston, SC
Secret Required to Start, TS SCI Required
As a Detection Engineer Cloud SME you will be responsible for designing, developing, and implementing detection mechanisms to identify cyber threats within a Cybersecurity Service Provider (CSSP) environment. You will focuse on creating and managing IDS/IPS signatures, log correlation rules, and other detection tools based on indicator lifecycle analysis. You collaborate with Defensive Cyber Operations (DCO) Watch Analysts and other teams to ensure timely and effective threat detection, adhering to CJCSM 6510.01B reporting requirements and supporting the CSSP’s mission to protect data across a wide spectrum of sources and locations.
Position Requirements and Duties
Minimum Qualifications
Desired Qualifications
Required Certifications
North Charleston, SC
Secret Required to Start, TS SCI Required
As a Detection Engineer Cloud SME you will be responsible for designing, developing, and implementing detection mechanisms to identify cyber threats within a Cybersecurity Service Provider (CSSP) environment. You will focuse on creating and managing IDS/IPS signatures, log correlation rules, and other detection tools based on indicator lifecycle analysis. You collaborate with Defensive Cyber Operations (DCO) Watch Analysts and other teams to ensure timely and effective threat detection, adhering to CJCSM 6510.01B reporting requirements and supporting the CSSP’s mission to protect data across a wide spectrum of sources and locations.
Position Requirements and Duties
- Act as the primary SME for cloud log sources, designing efficient and secure log ingestion pipelines across multi-cloud environments (AWS, Azure, GCP).
- Design and implement detection logic (KQL, EQL, and/or SPL) tailored to cloud-native threats, native threats and cloud infrastructure(eg containers like Kubernetes, Docker etc)Analyze threat intelligence to create and refine detection mechanisms tailored to the customer’s environment
- Validate and test detection rules to ensure accuracy, minimize false positive and benign positive matches, and enhance threat identification capabilities
- Collaborate with DCO Watch Analysts to integrate detection mechanisms into monitoring and incident response workflows
- Maintain and update detection tools and signatures in response to evolving threats, ensuring compliance with CJCSM 6510.01B and other applicable directives
- Compile and maintain internal standard operating procedure (SOP) documentation for detection creation and implementation processes
- Perform log analysis of Splunk and Elastic to support detection development and validation
- Coordinate with reporting agencies and subscriber sites to align detection strategies with operational needs and threat intelligence
- Participate in program reviews, product evaluations, and onsite certification evaluations to assess detection tool efficacy
- Overtime may be required to support detection implementation or incident response actions (Surge)
- Up to 10% travel may be required
Minimum Qualifications
- Bachelor’s Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP, SOC, or similar environment
- 2+ years of experience with signature development, detection logic creation and optimization on multiple platforms
- Must be a U.S. Citizen
Desired Qualifications
- Deep technical expertise in major cloud provider security models and services (AWS IAM, Azure AD, GCP IAM, CloudTrail, Azure Monitor, VPC flow logs, etc.).
- Experience working with and developing signatures for Splunk and Elastic
- Experience with threat intelligence platforms and indicator management
- Proficient knowledge of detection creation and implementation processes
- Expertise in IDS/IPS solutions, including signature development and optimization
- Strong understanding of the indicator lifecycle, including initial discovery, development, operational maturity, and long-term sustainment
- Effective verbal and written communication skills
- Ability to solve complex problems independently
- Preferred certifications: AWS Certified Security, Azure Security Engineer Associate, or equivalent SANS GIAC certifications.
Required Certifications
- Must have requisite certifications to fulfill DoD 8570 IAT Level II and CSSP-specific requirements
Top Skills
AWS
Azure
Elastic
Eql
GCP
Ids
Ips
Kql
Spl
Splunk
Am I A Good Fit?
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.
Success! Refresh the page to see how your skills align with this role.
The Company
What We Do
Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.








