Detection Engineer Elastic SME

Posted 13 Days Ago
Be an Early Applicant
Stuttgart, Baden-Württemberg
In-Office
Senior level
Security • Cybersecurity
The Role
The Detection Engineer is responsible for developing detection rules, managing IDS/IPS signatures, collaborating with analysts, and ensuring threat detection mechanisms in a cybersecurity environment.
Summary Generated by Built In
Cyber Security Analyst III, Detection Engineer Elastic SME
Internal Only 
Stuttgart, Germany 
Secret Clearance, with ability to obtain TS/SCI 

As a Detection Engineer you will be responsible for designing, developing, and implementing detection mechanisms to identify cyber threats within a Cybersecurity Service Provider (CSSP) environment. You will create and manage IDS/IPS signatures, log correlation rules, and other detection tools based on indicator lifecycle analysis. You will collaborate with Defensive Cyber Operations (DCO) Watch Analysts and other teams to ensure timely and effective threat detection, adhering to CJCSM 6510.01B reporting requirements and supporting the CSSP’s mission to protect data across a wide spectrum of sources and locations.
Position Requirements and Duties
  • Develop, implement, and maintain custom, high-fidelity detection rules and logic in the Elastic Security platform specifically targeting adversary TTPs mapped to the MITRE ATT&CK® framework.
  • Develop and prioritize risk-based alerting mechanisms to focus detection efforts on high-impact threats, aligning with organizational risk assessments
  • Analyze threat intelligence to create and refine detection mechanisms tailored to the customer’s environment
  • Validate and test detection rules to ensure accuracy, minimize false positive and benign positive matches, and enhance threat identification capabilities
  • Collaborate with DCO Watch Analysts to integrate detection mechanisms into monitoring and incident response workflows
  • Maintain and update detection tools and signatures in response to evolving threats, ensuring compliance with CJCSM 6510.01B and other applicable directives
  • Compile and maintain internal standard operating procedure (SOP) documentation for detection creation and implementation processes
  • Coordinate with reporting agencies and subscriber sites to align detection strategies with operational needs and threat intelligence
  • Participate in program reviews, product evaluations, and onsite certification evaluations to assess detection tool efficacy
  • Overtime may be required to support detection implementation or incident response actions (Surge)
  • Up to 10% travel may be required
Minimum Qualifications
  • Must be a current Adapt Forward Employee 
  • Bachelor’s Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP, SOC, or similar environment
  • 2+ years of experience with signature development, detection logic creation and optimization on multiple platforms
  • Must be a U.S. Citizen 
Desired Qualifications
  • Experience in threat detection engineering, threat hunting, or a related role with hands-on experience using the Elastic Stack, Kibana Query Language (KQL), Event Query Language (EQL), Elasticsearch Query Language (ES|QL) and/or Elastic Defend.
  • Experience with threat intelligence platforms and indicator management 
  • Proficient knowledge of detection creation and implementation processes  
  • Expertise in IDS/IPS solutions, including signature development and optimization 
  • Strong understanding of the indicator lifecycle, including initial discovery, development, operational maturity, and long-term sustainment 
  • Effective verbal and written communication skills
  • Ability to solve complex problems independently
  • Preferred certifications: Elastic Certified Analyst; Elastic Certified SIEM Analyst, Elastic Certified Engineer.

Required Certifications
  • Must have requisite certifications to fulfill DoD 8570 IAT Level II and CSSP-specific requirements 

 

Top Skills

Elastic Defend
Elastic Security
Elasticsearch Query Language
Event Query Language
Kibana Query Language
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: North Charleston, SC
90 Employees
Year Founded: 2015

What We Do

Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.

Similar Jobs

LogicMonitor Logo LogicMonitor

Account Executive

Artificial Intelligence • Cloud • Information Technology • Machine Learning • Software
Easy Apply
Hybrid
28 Locations
1100 Employees

RapDev Logo RapDev

Servicenow Engineer

Information Technology • Productivity • Professional Services • Software
Hybrid
28 Locations
130 Employees

Samsara Logo Samsara

Enterprise Account Executive

Artificial Intelligence • Cloud • Computer Vision • Hardware • Internet of Things • Software
Easy Apply
Remote or Hybrid
DE
4000 Employees
194K-278K Annually

Bose Logo Bose

Regional Director, Automotive Engineering

Automotive • eCommerce • Hardware • Music • Retail • Software • Wearables
Hybrid
Stuttgart, Baden-Württemberg, DEU
2900 Employees

Similar Companies Hiring

Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account