Blackpoint Cyber Logo

Blackpoint Cyber

SIEM Detection Engineer

Posted 3 Days Ago
Be an Early Applicant
Remote
Hiring Remotely in United States
113K-142K Annually
Senior level
Remote
Hiring Remotely in United States
113K-142K Annually
Senior level
As a SIEM Detection Engineer, you will build and tune detections using SIEM data, work with SOC analysts, improve data quality, and contribute to automation efforts.
The summary above was generated by AI

Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode,  fueled by a recent $190m series C round. 

What You’ll Do

As a SIEM Detection Engineer, you will focus on building and tuning high-fidelity detections using SIEM data sources, ensuring strong coverage across partner environments. You’ll work closely with SOC analysts, threat hunters, and platform teams to create detection content, improve data quality, and reduce alert fatigue. You also will contribute to light automation and enrichment where it improves triage outcomes.

· Create, test, and maintain detection logic and rules for new and emerging threats using SIEM telemetry.

· Tune alerts to reduce false positives and ensure detection rules have minimal gaps, maximizing the efficiency and accuracy of our 24x7 SOC.

· Build and refine detections using diverse log sources and integrations, including firewall and network security telemetry (e.g., FortiGate, SonicWall, and similar platforms), plus endpoint, identity, cloud, and DNS data where available.

· Collaborate with SOC analysts to identify common patterns and trends across customer environments and translate them into durable detection content.

· Assist in designing dashboards/visualizations to track threat trends, detection performance, and customer-specific patterns.

· Partner with ingestion/platform teams to troubleshoot parsing, normalization, indexing, and data availability issues impacting detection quality.

· Build or maintain test environments and validation workflows to safely verify detections against real-world attacker TTPs.

· Support incident response efforts by reviewing activity mitigated by the SOC and writing detections based on observed tradecraft.

· Contribute to enrichment and automation improvements (light scripting, workflow enhancements, alert context) to reduce investigation time and improve analyst decision-making.

What You’ll Bring

· Five (5+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement.

· Experience working in a SOC, Threat Hunting, or DFIR is preferred.

· Two (2+) years of experience with system tuning and/or engineering (SIEM, EDR, logging pipelines, or analytics platforms).

· Strong experience writing SIEM detections and queries (e.g., Elasticsearch/Kibana or similar).

· Familiarity with common network security and firewall logs and the ability to interpret and detect threats from them (e.g., FortiGate, SonicWall, and other vendor integrations).

· Familiarity with schemas such as OCSF.

· Working knowledge of Windows threat indicators and common attacker behaviors (process execution, persistence, lateral movement, credential access, C2 patterns).

· Knowledge of attacker tools, including legitimate software abused for malicious purposes.

· Familiarity with parent/child process relationships, command-line arguments, and how they are used to identify suspicious activity.

· Ability to troubleshoot and debug data ingestion issues, including parsing problems, missing fields, and normalization gaps.

· Excellent communication skills to summarize findings and present detection rationale, coverage, and trends.

· Ability to work independently with strong problem-solving skills.

Bonus

· Experience with log onboarding and integrations (syslog, agents, API-based collection) across common MSP stacks.

· Basic scripting/automation experience (Python and/or PowerShell) to support enrichment, detection testing, or workflow improvements.

· Experience creating Sigma and/or YARA rules and validating against adversary TTPs.

· Proficiency using Power BI or building Kibana dashboards for detection and trend visualization.

· Network/System Administration experience.

· CRTO, eCPTX, or other relevant certifications.

· Deep forensic knowledge of Windows, macOS and/or Linux.

· Malware analysis experience (behavioral and/or static analysis)

Blackpoint Cyber welcomes and encourages applications from qualified individuals of all races,  colors, religions, sex, sexual orientation, gender identity or expression, national origin, age, marital  status, or any other legally protected status. We are committed to equality of opportunity in all  aspects of employment.  For eligible employees in the US, Blackpoint offers competitive Health, Vision, Dental, and Life Insurance plans, a robust 401k plan, Discretionary Time Off, and other minor perks.

Top Skills

Edr
Elasticsearch
Fortigate
Kibana
Ocsf
Power BI
Powershell
Python
SIEM
Sonicwall

Similar Jobs

12 Minutes Ago
Remote or Hybrid
Detroit, MI, USA
26-26 Hourly
Internship
26-26 Hourly
Internship
Artificial Intelligence • Big Data • Cloud • Information Technology • Software • Big Data Analytics • Automation
As an intern at Dynatrace, you'll support projects in AI and automation, enhance customer knowledge management, and collaborate with teams on strategy and innovation.
Top Skills: ExcelJavaLlm/AiPowerPointPythonWord
22 Minutes Ago
Remote or Hybrid
United States
60K-150K Annually
Senior level
60K-150K Annually
Senior level
Fintech • Software
The Staff Frontend Engineer will design and implement complex frontend systems, lead engineering efforts, and collaborate with cross-functional teams to deliver a sophisticated SaaS platform.
Top Skills: AngularDockerJavaScriptMicro-FrontendsNode.jsPostgresReactReduxRedux-SagaSQL ServerTypescript
2 Hours Ago
In-Office or Remote
Bingen, WA, USA
184K-253K Annually
Senior level
184K-253K Annually
Senior level
Aerospace • Information Technology • Software • Cybersecurity • Design • Defense • Manufacturing
Lead growth initiatives and partnerships in the US Domestic aerospace and defense sectors, focusing on business development and customer engagement.
Top Skills: Microsoft Office SuiteSalesforce

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account