This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are seeking a Senior Security Engineer with a specialty in Detection and Incident Response to join our Security Engineering team. This role sits at the intersection of security operations and software engineering — you won't just investigate incidents, you'll build the systems that detect, contain, and prevent them. You will design and ship high-precision detections across cloud services and enterprise SaaS, develop automation that shortens response timelines, and mature the telemetry pipelines that make it all possible. Your ability to write production-quality code is just as important as your ability to triage an alert.
Job Responsibility:
Engineer, test, and deploy detection logic across cloud and enterprise environments, treating detections as software with version control, peer review, and measurable performance
Build and maintain incident response automation, runbooks, and tooling that reduce containment timelines without sacrificing developer velocity
Mature telemetry pipelines through improved schema design, normalization, enrichment, and quality checks that reduce false positives and increase signal fidelity
Perform digital incident investigations to identify and contain potential security breaches
Conduct digital forensics and malware analysis to understand attack vectors and adversary methodologies
Integrate alerting with messaging and ticketing systems to enable fast, traceable response workflows
Partner cross-functionally with IT, security, and engineering teams to harden identity and access patterns, close logging and forensics gaps, and implement maintainable guardrails that scale with the organization
Utilize threat intelligence platforms to improve hunting, detection, and response workflows
Clearly explain the significance and impact of incidents, providing actionable recommendations to both technical and non-technical stakeholders
Requirements:
5+ years of experience in Detection Engineering, Incident Response, or Security Operations, with a strong emphasis on building and shipping security tooling and automation
Proficiency in at least one programming language (e.g., Python, Go) and comfort writing production-grade code — not just scripts
Hands-on experience designing or improving detection pipelines, SIEM content, and alerting workflows in cloud-native environments
Practical experience with SIEM, EDR, and SOAR tools, with a preference for candidates who have built integrations or extended these platforms programmatically
Strong understanding of modern cyber threats, common attack techniques, and adversary TTPs
Familiarity with digital forensics tools and malware analysis techniques
Experience with cloud-native environments (e.g., AWS, GCP, Azure) and the security telemetry those environments generate
Exposure to threat intelligence platforms and integrating intel into detection and investigation workflows
Strong communication skills, with the ability to translate complex security findings into clear business impact
Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus
Nice to have:
Relevant security certifications (e.g., GCIH, GCFA, GCIA, CISSP, GDSA) are a plus