Position Details
About this role
This role involves developing and maintaining cybersecurity detection tools, collaborating with analysts, and supporting incident response activities within a SOC environment.
Key Responsibilities
- Engineer detections across telemetry sources
- Develop SOPs and runbooks
- Apply threat-informed defense practices
- Tune detection logic to reduce false positives
- Participate in SOC incident response
Technical Overview
The technical environment includes SIEM platforms like Splunk, endpoint security tools such as CrowdStrike, and frameworks like MITRE ATT&CK, with scripting in Python, PowerShell, and Bash.
Ideal Candidate
The ideal candidate is a mid-level cybersecurity engineer with at least four years of detection engineering experience, proficient in SIEM tools, scripting, and threat frameworks like MITRE ATT&CK. They should be capable of developing and optimizing detection and response strategies within a SOC environment.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of experience with SIEM tools, No scripting knowledge (Python, PowerShell, Bash), No familiarity with cybersecurity frameworks, Unwillingness to participate in rotational on-call duties
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile