Primary ObjectivesAssist in creating tuning and maintaining detection rules across EDR and MDR and validate alerts to ensure efficacy and minimize false senior engineers in the development of detection strategies and threat responsibilities & AccountabilitiesBuild and modify detection rules for EDR tools (SentinelOne etc.).Analyze endpoint telemetry and alerts to identify gaps in coverage or high-fidelity detection in triage of detection hits to understand alert quality and identify tuning with senior detection engineers and threat intelligence teams to understand adversary behaviors and translate them into detection retrospective testing of new detections against historical rule logic associated TTPs and use case in content validation exercises using benign or simulated malicious current with emerging threats tools and attacker operational tuning and the reduction of alert fatigue through logic to knowledge sharing and internal & AbilityBachelors degree in Cybersecurity Computer Science or related field preferred (or equivalent hands-on experience).0-2 years in a detection engineering threat hunting or SOC engineering experience in a MSSP or large enterprise SOC environment highly preferred..
Required Experience:
IC
Primary ObjectivesAssist in creating tuning and maintaining detection rules across EDR and MDR and validate alerts to ensure efficacy and minimize false senior engineers in the development of detection strategies and threat responsibilities & AccountabilitiesBuild and modify detection rules for E...
Primary ObjectivesAssist in creating tuning and maintaining detection rules across EDR and MDR and validate alerts to ensure efficacy and minimize false senior engineers in the development of detection strategies and threat responsibilities & AccountabilitiesBuild and modify detection rules for EDR tools (SentinelOne etc.).Analyze endpoint telemetry and alerts to identify gaps in coverage or high-fidelity detection in triage of detection hits to understand alert quality and identify tuning with senior detection engineers and threat intelligence teams to understand adversary behaviors and translate them into detection retrospective testing of new detections against historical rule logic associated TTPs and use case in content validation exercises using benign or simulated malicious current with emerging threats tools and attacker operational tuning and the reduction of alert fatigue through logic to knowledge sharing and internal & AbilityBachelors degree in Cybersecurity Computer Science or related field preferred (or equivalent hands-on experience).0-2 years in a detection engineering threat hunting or SOC engineering experience in a MSSP or large enterprise SOC environment highly preferred..
Required Experience:
IC
View more
View less