About The Position

Rearc is looking for a Cybersecurity Threat Detection Engineer with proactive communication skills, a foundation in DevSecOps, Detection-As-Code, deep purple team technical expertise, and an entrepreneurial approach to join our growing Cybersecurity practice. This role involves partnering with Rearc customers to design cutting-edge detection strategies and support the development of top-tier, modern cybersecurity monitoring programs. You will craft tailored security detections to strengthen our clients' cybersecurity efforts by leveraging Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) services. What You Bring Enthusiasm about developing and evangelizing services in the cyber space. Strong cloud, security, SIEM and data engineering fundamentals. What You'll Do Utilize NDR, EDR, real-time streaming, and SIEM technologies to develop robust threat detection capabilities. Build and optimize detection rules leveraging real-time data streaming to enhance detection accuracy. Design enrichment pipelines and automation workflows to enhance the precision of threat detections. Develop correlation logic and automated processes to create high-fidelity threat alerts. Build compliance and recoverability of customer Data Analytics solutions, including SOPs, data onboarding, normalization, enrichment, and system maintenance. Create automation playbooks for incident triage and response. Align detection content with customer-specific Use Case Frameworks and provide metrics on cybersecurity threats impacting their environment. Collaborate with customer cybersecurity teams to cover gaps and enhance enterprise posture. Support enterprise Cybersecurity, Information Technology (IT), and Operational Technology (OT) teams by providing dashboards and other data exploration tools. Stay continually aware of emerging cybersecurity threats and trends, adapting detection strategies as needed. Work closely with customer teams, including Cybersecurity Operations Center (CSOC), Operational Technology (OT), and Incident Response (IR) teams, to ensure detections are actionable and relevant. Provide feedback to improve the customer's security framework and overall security monitoring strategy. In this role, you will combine technical expertise with continual situational awareness of emerging threats, driving client success while staying at the cutting edge of cyber security innovations.

Requirements

  • 5-8 years of experience in Cybersecurity with a focus on: Log streaming Cybersecurity data lakes and data warehousing SOAR engineering SIEM engineering, administration, architecture, and operations Data science, statistical analysis, and threat detection development Integrating disparate IT, OT, and business applications into SIEM systems
  • Bachelor's degree in Management Information Systems, Computer Science, or a related field
  • A strong passion for Cybersecurity and a commitment to staying current with industry trends, best practices, and tools
  • Proven experience in documenting, socializing, and operationalizing Cybersecurity technologies and processes
  • Prior programming experience in Python, SQL, and Apache Spark
  • Solid understanding of common attack techniques and their practical applications
  • Demonstrated ability to work effectively across multiple teams, building cross-functional relationships with individuals of varying technical expertise
  • A self-starter with a proven ability to thrive in fast-paced environments
  • Strong technical communication skills, both written and verbal

Nice To Haves

  • Prior experience with platforms like Databricks, Cribl, Tines, or other cybersecurity lakehouse providers

Responsibilities

  • Utilize NDR, EDR, real-time streaming, and SIEM technologies to develop robust threat detection capabilities.
  • Build and optimize detection rules leveraging real-time data streaming to enhance detection accuracy.
  • Design enrichment pipelines and automation workflows to enhance the precision of threat detections.
  • Develop correlation logic and automated processes to create high-fidelity threat alerts.
  • Build compliance and recoverability of customer Data Analytics solutions, including SOPs, data onboarding, normalization, enrichment, and system maintenance.
  • Create automation playbooks for incident triage and response.
  • Align detection content with customer-specific Use Case Frameworks and provide metrics on cybersecurity threats impacting their environment.
  • Collaborate with customer cybersecurity teams to cover gaps and enhance enterprise posture.
  • Support enterprise Cybersecurity, Information Technology (IT), and Operational Technology (OT) teams by providing dashboards and other data exploration tools.
  • Stay continually aware of emerging cybersecurity threats and trends, adapting detection strategies as needed.
  • Work closely with customer teams, including Cybersecurity Operations Center (CSOC), Operational Technology (OT), and Incident Response (IR) teams, to ensure detections are actionable and relevant.
  • Provide feedback to improve the customer's security framework and overall security monitoring strategy.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service