Senior Detection Engineer - Healthcare Technology

cyber focus ai United State
Remote
Apply
AI Summary

Cyber Focus AI is seeking a Senior Detection Engineer to lead the development and implementation of high-fidelity detection rules for identifying potential security threats. The ideal candidate will have experience with Splunk Enterprise Security, SIEM, and EDR. This is a remote opportunity with a comprehensive benefits package.

Key Highlights
Lead the development, testing, and implementation of high-fidelity detection rules
Utilize SIEM to monitor and analyze security logs
Conduct proactive threat hunting and develop countermeasures
Collaborate with cross-functional teams to enhance existing data sources
Technical Skills Required
Splunk Enterprise Security SIEM EDR SPL KQL Microsoft Defender EDR
Benefits & Perks
Salary up to $160,600 annually
Comprehensive benefits package
Flexibility to work remotely from anywhere within the U.S.
Supportive and inclusive work culture
Incentive and recognition programs

Job Description


Cyber Focus AII's mission is to help cybersecurity professionals discover cutting-edge opportunities in their field. We are not a staffing firm or agency. Cyber Focus AI does not hire for these roles—we use advanced technology to locate and verify them from actual employers.

**Employer Industry: Healthcare Technology**

Why Consider This Job Opportunity

  • Salary up to $160,600 annually
  • Comprehensive benefits package, including equity stock purchase and 401k contribution
  • Opportunity for career advancement and development within the organization
  • Flexibility to work remotely from anywhere within the U.S.
  • Supportive and inclusive work culture focused on health optimization
  • Incentive and recognition programs to reward performance

What To Expect (Job Responsibilities)

  • Lead the development, testing, tuning, implementation, and maintenance of high-fidelity detection rules for identifying potential security threats
  • Utilize a SIEM to monitor and analyze security logs, identify threats, and investigate complex security incidents
  • Conduct proactive threat hunting, analyze attack techniques, and develop countermeasures
  • Coordinate and lead incident response activities, including containment, root cause analysis, eradication, and recovery
  • Collaborate with cross-functional teams to identify relevant security telemetry and enhance existing data sources for improved detection and analysis

What Is Required (Qualifications)

  • 3+ years of experience and deep understanding of the Splunk Enterprise Security platform
  • 3+ years of hands-on experience writing and optimizing detection queries in SPL for Splunk and KQL for Microsoft Defender EDR
  • 3+ years of experience utilizing SIEM for log analysis, monitoring, and investigation
  • 2+ years of experience working in a Security Operations Center (SOC) environment
  • Demonstrated expertise in EDR, email security, and securing SaaS applications

How To Stand Out (Preferred Qualifications)

  • 2+ years of experience in Detection Engineering or Digital Forensics with broad knowledge of the security domain
  • Demonstrated analytical and problem-solving skills with the ability to identify and mitigate security risks
  • Strong communication and collaboration skills, with the ability to work effectively in a team environment

#HealthcareTechnology #Cybersecurity #RemoteWork #CareerGrowth #InclusiveWorkplace

We prioritize candidate privacy and champion equal-opportunity employment. Central to our mission is our partnership with companies that share this commitment. We aim to foster a fair, transparent, and secure hiring environment for all. If you encounter any employer not adhering to these principles, please bring it to our attention immediately.

We are not the EOR (Employer of Record) for this position. Our role in this specific opportunity is to connect outstanding candidates with a top-tier employer.

#CyberFocusAI

Subscribe our newsletter

New Things Will Always Update Regularly