MethodHub
Cybersecurity Threat Detection Engineer (USC / GC / GC EAD)
MethodHub, San Antonio, Texas, United States, 78208
Cybersecurity Threat Detection Engineer (USC / GC / GC EAD)
This range is provided by MethodHub. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range $50.00/hr - $50.00/hr
Duration: 6+ Months (11/20/2025 – 06/05/2026)
Job Description We are seeking an experienced
Detection Engineer
to design, develop, and maintain advanced threat detection systems that strengthen organizational security posture. The role involves crafting detection logic, integrating telemetry from multiple sources, and implementing “detection-as-code” principles to enhance threat identification and response capabilities.
Responsibilities
Design, build, and maintain detection systems, including writing and optimizing detection rules.
Analyze security logs, research emerging threats, and refine detection logic for improved accuracy.
Integrate telemetry from various data sources and map detections to frameworks such as
MITRE ATT&CK .
Develop and enhance detection rules, logic, and models for
SIEM ,
EDR , and cloud-native platforms.
Investigate alerts, analyze logs, and process raw data to identify potential malicious activities while minimizing false positives.
Implement
detection-as-code
practices using version control and CI/CD pipelines for automated testing and deployment.
Collaborate with
threat hunting ,
security operations , and
engineering teams
to strengthen overall detection coverage.
Maintain a centralized
library of detection rules and playbooks
to promote consistency and operational efficiency.
Required Skills & Qualifications
6+ years of experience in
Cybersecurity ,
Threat Detection , or
Security Engineering .
Hands‑on experience with
SIEM
platforms (e.g., Splunk, QRadar, Azure Sentinel) and
EDR
solutions.
Familiarity with
MITRE ATT&CK
framework and detection engineering best practices.
Strong proficiency in
scripting languages
(Python, PowerShell, or similar) for automation.
Experience with
CI/CD pipelines ,
version control (Git) , and
detection-as-code
principles.
Excellent analytical, troubleshooting, and problem‑solving skills.
Strong written and verbal communication skills, with the ability to collaborate across teams.
Seniority level Mid-Senior level
Employment type Contract
Job function Information Technology
Industries IT Services and IT Consulting and Software Development
#J-18808-Ljbffr
Base pay range $50.00/hr - $50.00/hr
Duration: 6+ Months (11/20/2025 – 06/05/2026)
Job Description We are seeking an experienced
Detection Engineer
to design, develop, and maintain advanced threat detection systems that strengthen organizational security posture. The role involves crafting detection logic, integrating telemetry from multiple sources, and implementing “detection-as-code” principles to enhance threat identification and response capabilities.
Responsibilities
Design, build, and maintain detection systems, including writing and optimizing detection rules.
Analyze security logs, research emerging threats, and refine detection logic for improved accuracy.
Integrate telemetry from various data sources and map detections to frameworks such as
MITRE ATT&CK .
Develop and enhance detection rules, logic, and models for
SIEM ,
EDR , and cloud-native platforms.
Investigate alerts, analyze logs, and process raw data to identify potential malicious activities while minimizing false positives.
Implement
detection-as-code
practices using version control and CI/CD pipelines for automated testing and deployment.
Collaborate with
threat hunting ,
security operations , and
engineering teams
to strengthen overall detection coverage.
Maintain a centralized
library of detection rules and playbooks
to promote consistency and operational efficiency.
Required Skills & Qualifications
6+ years of experience in
Cybersecurity ,
Threat Detection , or
Security Engineering .
Hands‑on experience with
SIEM
platforms (e.g., Splunk, QRadar, Azure Sentinel) and
EDR
solutions.
Familiarity with
MITRE ATT&CK
framework and detection engineering best practices.
Strong proficiency in
scripting languages
(Python, PowerShell, or similar) for automation.
Experience with
CI/CD pipelines ,
version control (Git) , and
detection-as-code
principles.
Excellent analytical, troubleshooting, and problem‑solving skills.
Strong written and verbal communication skills, with the ability to collaborate across teams.
Seniority level Mid-Senior level
Employment type Contract
Job function Information Technology
Industries IT Services and IT Consulting and Software Development
#J-18808-Ljbffr