Cyber Detection & Automation Engineer (WA)
Quick Summary
function googleTranslateElementInit() { new google.translate.TranslateElement({pageLanguage: 'en'}, 'google_translate_element'); } Cyber Detection & Automation Engineer (WA)…
• Bachelor’s degree in cybersecurity, computer science, information technology, or related field. • 5+ years in cybersecurity, with 3+ years specifically in detection and automation engineering.
• Design, implement and automate high-fidelity detection rules using SIEM, EDR, and other telemetry sources (e.g. Sentinel, Defender, AWS, etc.) to improve efficiency and accuracy.
• Monitor and tune alerts to reduce false positives and improve signal-to-noise ratio.
• Regularly test and validate detection content to ensure its effectiveness and accuracy.
• Create documentation and knowledge transfer materials for detections and engineering processes.
• Perform gap analysis and continuously improve detection coverage, accuracy, and resilience.
• Design and develop security automations workflows using SOAR (Security Orchestration, Automation, and Response) primarily using Microsoft Sentinel/Logic Apps.
• Build and maintain custom integrations with SIEM, EDR, Threat Intel feeds, ticketing systems, and other SOC tools.
• Automate repetitive SOC tasks such as alert triage, enrichment, IOC lookups, and ticket creation.
• Develop dashboards or utilities to improve visibility and operational insights into SOC metrics.
• Collaborate with security operations center analysts & threat intelligence to stay ahead of evolving adversary tactics (MITRE ATT&CK-based).
• Create and update relevant runbooks, playbooks and other necessary documentation around detection rules and attacker TTP's.
• Prepare and present detailed reports on detection/automation activities, findings, and improvements to senior management.
Requirements
~2 min read• Bachelor’s degree in cybersecurity, computer science, information technology, or related field.
• 5+ years in cybersecurity, with 3+ years specifically in detection and automation engineering.
• Proficiency in writing detection logic using KQL, SPL or other relevant query languages.
• Experience with query languages such as KQL, SPL and scripting languages (Bash, PowerShell, Python, JavaScript)
• Proficient in developing automations using SOAR platforms, specifically Microsoft Sentinel/Logic Apps
• Understanding of SOC operations, incident response workflows, and threat detection techniques.
• Experience with RESTful APIs and integration of third-party tools. • Experience building advanced analytics (ML) and developing AI agents/tools • Experience in a cloud-first or hybrid cloud environment (preferably AWS and Azure).
• Strong, practical knowledge of the MITRE ATT&CK framework, and how to map adversary behaviors to telemetry for detection design.
• Deep understanding of attacker TTPs, threat modeling, and detection methodologies.
• Familiarity with version control (Git), CI/CD pipelines, and infrastructure as code concepts.
• Experience in using security orchestration, automation, and response tools. • Strong analytical skills to analyze large volumes of data and identifying potential threats, patterns.
• The ability to effectively communicate both verbally and in writing to audiences of different technical skill levels.
• Relevant certifications such as:
o Microsoft SC-200, Azure Security Engineer Associate
o AWS Certified Security – Specialty
o GIAC (GCIA, GCTI, GDAT), CISSP, or CISM
Department: Preferred Vendors
This is a contract position
Location & Eligibility
Listing Details
- First seen
- May 6, 2026
- Last seen
- May 9, 2026
Posting Health
- Days active
- 0
- Repost count
- 0
- Trust Level
- 49%
- Scored at
- May 6, 2026
Signal breakdown
4 other jobs at dt
View all →Explore open roles at dt.
Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.
.jpg)