This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are currently seeking a Senior Logging & Detection Engineer to lead the technical direction within our rapidly growing Security team and our new Logging Engineering team. This role is for a seasoned professional passionate about building sophisticated, scalable detection architectures, mastering efficient queries at petabyte scale, and driving strategic security analytics through log data. You will own the detection and analysis layer of our logging platform, serving as the domain expert who makes a tangible, high-impact difference to our security monitoring capabilities.
Job Responsibility:
Lead the design and implementation of sophisticated, production-ready detection rules and queries across the ELK stack, security data lakes, and multi-cloud logging platforms
Architect and optimize complex search queries, aggregations, and analytics dashboards for high-velocity security monitoring, focusing on performance and cost efficiency
Design and build automated detection and response workflows (SOAR), ensuring seamless and reliable integration with critical incident response systems
Serve as the primary liaison with the threat intelligence team, developing and owning the framework to translate intelligence into scalable, actionable detection capabilities (e.g., MITRE ATT&CK coverage)
Establish and maintain a robust detection rule library, query templates, and lead the creation of security analytics playbooks for the wider team
Drive performance optimization and resource utilization strategies across petabyte-scale log datasets, including index design and data tiering
Develop and standardize custom visualizations, dashboards, and executive reporting capabilities for security stakeholders
Lead complex threat hunting operations, mentor junior team members on investigative techniques, and proactively refine detection logic to achieve near-zero false positive rates
Collaborate closely with the platform team to define the logging architecture roadmap based on future detection requirements and security observability goals
Proactively research emerging threats and attack patterns, translating novel techniques into strategic, forward-looking detection logic and advising security leadership
Requirements:
Senior-level expertise building and scaling enterprise-grade detection capabilities and security monitoring systems
Expert-level query language proficiency in at least two of the following: Elasticsearch/Lucene, SQL, KQL (Kusto), or SPL (Splunk), demonstrating advanced optimization techniques
Extensive Detection Engineering experience owning the full lifecycle of rules, alerts, and automated response workflows within a SIEM/SOAR environment
Advanced log analysis skills across diverse, large-scale data sources, including multi-cloud logs (AWS, Azure, GCP), network flows, and advanced security tool outputs
Deep dashboard and visualization expertise with tools like Kibana, Grafana, or Tableau, specifically for security metrics and executive reporting
Proven expertise in leading threat hunting efforts using log data to proactively identify and track sophisticated threats and anomalous behavior across the environment
Senior-level scripting and automation abilities (Python/Go/PowerShell), used to build custom tools, manage APIs, and drive detection automation at scale
Architectural experience integrating and optimizing SIEM platforms, SOAR tools, and security orchestration systems
Expert performance optimization skills covering query tuning, index design, data partitioning, and overall resource-efficient analytics on big data
Significant incident response experience providing expert-level technical analysis and forensic support during major security incidents
Nice to have:
Strategic experience with advanced analytics, machine learning, or statistical modeling for security, such as User and Entity Behavior Analytics (UEBA) or predictive threat modeling
Multi-platform security architecture experience across major cloud environments (AWS CloudTrail, Azure Activity Logs, GCP Audit Logs)
Deep, practical experience building custom detection content mapped directly to the MITRE ATT&CK framework, including coverage gap analysis
Industry-recognized security certifications such as GCTI, GCFA, GNFA, or CISSP
Track record of open source contributions to detection rule repositories, security analytics tools, or SIEM content
Data science or advanced mathematics background with direct experience in anomaly detection, clustering, or predictive analytics for security
Expert API integration skills for automated, real-time threat intelligence ingestion and centralized detection rule management
Cloud security analytics mastery utilizing cloud-native security services (e.g., Security Hub, Defender for Cloud) and serverless detection architectures
Compliance and reporting leadership experience building analytics and dashboards for regulatory requirements (e.g., SOC 2, ISO 27001) and defining key security metrics
What we offer:
Top-tier health benefits, dental, and vision insurance
Hybrid work environment
Flexible time off policy, with an encouraged 20 days off per year
$2000 annual counseling benefit
RRSP matching and RESP contribution
Clioversary recognition program with special acknowledgement at 3, 5, 7, and 10 years
Welcome to CrawlJobs.com – Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.
We use cookies to enhance your experience, analyze traffic, and serve personalized content. By clicking “Accept”, you agree to the use of cookies.