Detection Engineer Cloud SME

Reposted 12 Days Ago
Be an Early Applicant
North Charleston, SC
In-Office
Senior level
Security • Cybersecurity
The Role
As a Detection Engineer Cloud SME, you will design and implement detection mechanisms for cyber threats, collaborate with analysts, and maintain detection tools in a CSSP environment.
Summary Generated by Built In
Cyber Security Analyst III, Detection Engineer Cloud SME
North Charleston, SC
Secret Required to Start, TS SCI Required

As a Detection Engineer Cloud SME  you will be responsible for designing, developing, and implementing detection mechanisms to identify cyber threats within a Cybersecurity Service Provider (CSSP) environment. You will focuse on creating and managing IDS/IPS signatures, log correlation rules, and other detection tools based on indicator lifecycle analysis. You collaborate with Defensive Cyber Operations (DCO) Watch Analysts and other teams to ensure timely and effective threat detection, adhering to CJCSM 6510.01B reporting requirements and supporting the CSSP’s mission to protect data across a wide spectrum of sources and locations.
Position Requirements and Duties
  • Act as the primary SME for cloud log sources, designing efficient and secure log ingestion pipelines across multi-cloud environments (AWS, Azure, GCP). 
  • Design and implement detection logic (KQL, EQL, and/or SPL) tailored to cloud-native threats, native threats and cloud infrastructure(eg containers like Kubernetes, Docker etc)Analyze threat intelligence to create and refine detection mechanisms tailored to the customer’s environment
  • Validate and test detection rules to ensure accuracy, minimize false positive and benign positive matches, and enhance threat identification capabilities
  • Collaborate with DCO Watch Analysts to integrate detection mechanisms into monitoring and incident response workflows
  • Maintain and update detection tools and signatures in response to evolving threats, ensuring compliance with CJCSM 6510.01B and other applicable directives
  • Compile and maintain internal standard operating procedure (SOP) documentation for detection creation and implementation processes
  • Perform log analysis of Splunk and Elastic to support detection development and validation
  • Coordinate with reporting agencies and subscriber sites to align detection strategies with operational needs and threat intelligence
  • Participate in program reviews, product evaluations, and onsite certification evaluations to assess detection tool efficacy
  • Overtime may be required to support detection implementation or incident response actions (Surge)
  • Up to 10% travel may be required

Minimum Qualifications
  • Bachelor’s Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP, SOC, or similar environment
  • 2+ years of experience with signature development, detection logic creation and optimization on multiple platforms
  • Must be a U.S. Citizen

Desired Qualifications
  • Deep technical expertise in major cloud provider security models and services (AWS IAM, Azure AD, GCP IAM, CloudTrail, Azure Monitor, VPC flow logs, etc.).
  • Experience working with and developing signatures for Splunk and Elastic
  • Experience with threat intelligence platforms and indicator management
  • Proficient knowledge of detection creation and implementation processes 
  • Expertise in IDS/IPS solutions, including signature development and optimization
  • Strong understanding of the indicator lifecycle, including initial discovery, development, operational maturity, and long-term sustainment
  • Effective verbal and written communication skills
  • Ability to solve complex problems independently
  • Preferred certifications: AWS Certified Security, Azure Security Engineer Associate, or equivalent SANS GIAC certifications.

Required Certifications
  • Must have requisite certifications to fulfill DoD 8570 IAT Level II and CSSP-specific requirements

 

Top Skills

AWS
Azure
Elastic
Eql
GCP
Ids
Ips
Kql
Spl
Splunk
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: North Charleston, SC
90 Employees
Year Founded: 2015

What We Do

Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.

Similar Jobs

Zscaler Logo Zscaler

Staff Security Researcher

Cloud • Information Technology • Security • Software • Cybersecurity
Remote or Hybrid
USA
8697 Employees
116K-165K Annually

RigUp Logo RigUp

Specialist, Accounts Receivable Operations

Information Technology • Professional Services • Software • Energy
Remote or Hybrid
USA
260 Employees
Easy Apply
Remote or Hybrid
United States
1400 Employees
19-21 Hourly

Beyond Finance Logo Beyond Finance

Customer Service Representative

Fintech • Financial Services
Easy Apply
Remote or Hybrid
United States
1400 Employees

Similar Companies Hiring

Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account