
Detection Engineer
CyderesPosted 4/22/2025

Detection Engineer
Cyderes
Job Location
Job Summary
Cyderes is seeking a Detection Engineer to join their managed services team. The ideal candidate will have prior experience in SIEM administration, data analysis, and security operations. They will work with teams internally and clients externally to develop threat-informed detection rules, analyze data to generate actionable insights, and provide support for multiple SIEM technologies. The role requires strong written and oral communication skills, a passion for delivering valuable data insights, and the ability to handle high-priority demands while driving consistent results. Cyderes values a fast-paced work environment and is looking for like-minded individuals who have a passion for continual improvement and creating solutions to complex problems.
Job Description
Responsibilities:
- Design and work with partners to collect detection data and assist in generating meaningful insights
- Provide production support for multiple SIEM technologies (Chronicle, CrowdStrike NextGen SIEM)
- Assist in the creation of business requirements for iteratively improving detection engineering workflows, processes and procedures
- Analyze data on detection rule performance to provide feedback and identify tuning opportunities
- Attend client calls when required to discuss detection rule requirements and capabilities
- Provide production support and solve complex business-vertical specific issues
- Advocate for efficient and appropriate detection rules for our clients
- Involved in all agile meetings providing feedback to team and project managers
- Work cross-functionally with other members and teams within the entire Cyderes organization on a professional level
Requirements:
- Prior experience in one or more SIEM (Splunk, Chronicle, Sentinel, QRadar, LogRythm, etc) platforms’ administration including developing and implementing detection rules and or saved searches using YaraL, KQL, SPL, AQL or other detection language
- Prior experience interacting with or administering common security technologies (SIEM, EDR, Phishing, IDS/IPS, Firewall, etc)
- Prior experience analyzing data in common log formats (JSON, YAML, XML, CEF, CSV, etc.)
- Understands the basics of data/log analysis and the relationships between data sets
- Understands the basics of extracting, transforming, and loading data
- Understands the basic use of ITSM tools (Jira, ServiceNow, etc)
- Understands basic security threats (Insider, APT, Malware, Emerging Threats, etc)
- Understands basic open-source intelligence gathering (IOCs, Threat Actors, etc)
- Understands basic pattern matching (regular expressions)
- Understands the basics of security operations
- Strong written and oral communication skills, must be able to explain data and how detection rules use that data to an audience with a variety of technical skills
- Splunk or other SIEM certification is a plus
- Knowledge of Python, or other scripting languages is a plus
- Knowledge of SQL is a plus
- Knowledge of CI/CD is a plus
- Knowledge of various DBMS platforms (Spanner, BigQuery, MySQL) is a plus
- Knowledge of interacting with APIs (Postman, Insomnia, curl, etc) is a plus
- Knowledge of GCP environments is a plus