Getronics
Detection Engineer
GetronicsItaly2 days ago
Full-timeRemote FriendlyInformation Technology

Detection Engineer


About the Role

We are looking for a Senior Detection Engineer to join our international cybersecurity team. The person who joins will help build upon the current ATT&CK-based detection manual used by the Getronics Security Operations Center (SOC), and take it to the next level of maturity and capability. Additionally, they will support the day-to-day threat detection work of a team of analysts servicing a wide range of clients across various industries, including Getronics' private/hybrid cloud and internal IT services.


Key Responsibilities

· Develop threat detection rules to identify modern attacker tactics and techniques, working closely with threat intelligence, incident response, security analysts, and infrastructure/security architecture teams.

· Maintain and optimize the existing detection rulebase, applying lifecycle management and deprecating rules where needed.

· Assess ATT&CK coverage to identify detection gaps and improvement opportunities.

· Define and maintain effective detection metrics.

· Support compliance-related use cases as required.

· Create and maintain lists to support correlation rules.

· Design dashboards for specific threat detection use cases and train analysts on their use.

· Provide input into threat hunting activities through the development of efficient search queries.

· Collaborate with business and IT teams to create detection strategies aligned with current and emerging business needs.

· Analyze alert trends and propose improvements.

· Support data collection improvements and maintain configuration management documentation.


Requirements

· Minimum of 2 years' experience as a Cybersecurity Detection Analyst working with SIEM technologies (QRadar, LogRhythm, Splunk, Elastic Security, InsightIDR, AlienVault OSSIM, etc.).

· Previous experience in other technical cybersecurity roles such as SOC Analyst, Threat Intelligence Analyst, or Pentester.

· Hands-on experience implementing detection playbooks based on the MITRE ATT&CK framework.

· Strong analytical and problem-solving skills.

· Solid understanding of the current threat landscape, including common attack vectors and best practices for protecting systems and networks.

· Advanced knowledge or experience with at least two of the following technologies: Python, RegEx, Sigma, YARA.

· Experience fine-tuning correlation rules for optimal performance.

· Strong communication skills with the ability to document clearly and summarize effectively.

· Fluent English is mandatory due to international team collaboration.

· Structured, goal-oriented working style.

Key Skills

Ranked by relevance