New
Security Engineer (Sr.)
![]() | |
![]() United States, D.C., Washington | |
![]() | |
Security Engineer (Sr.) Washington, DC Pay From: $145,000 per year MUST: Experienced Sr Security Engineer Active DoD Top Secret Clearance 7+ years of experience in Cyber Security 2+ years of experience in Cyber Threat Intelligence (CTI), Threat Hunting, Adversary Emulation, or Detection Engineering 2+ years of experience working as a lead of a team or project Familiarity with SOC workflows, telemetry pipelines, and threat modeling Background in writing formal technical reports with a focus on clarity, completeness, and audience relevance Strong understanding of log sources across domains, including: Host-based logs (Windows Event Logs, Sysmon, EDR), Network telemetry (firewall, proxy, VPN, DNS, NDR), and Cloud logs (Azure AD, AWS CloudTrail, O365 Management Activity) Well versed in Hypothesis-driven hunting, Behavior pattern detection and other threat hunting techniques Ability to map cyber threat intelligence to technical detections, SOC coverage gaps, or architectural weaknesses Familiarity with data routing/normalization platforms (e.g., CRIBL) is a plus Excellent communication skills both written and verbal Strong interpersonal skills with the ability to work well with Leadership and peers alike Strong attention to details and solid documentation skills Security certifications such as GCTI, GCFA, GREM, OSCP, or Splunk Certified Architect are a plus Bachelor's Degree is required DUTIES: Lead and mentor a cross-functional team of CTI analysts, threat hunters, and detection engineers Architect detection strategies based on emerging threats, adversary behaviors, and customer risk posture Drive threat hunting operations to proactively identify undetected malicious activity Translate threat intelligence reports and TTP analysis into actionable detections, telemetry gaps, and defensive measures Oversee and ensure the accuracy, clarity, and timeliness of all team deliverables, including : Detection documentation and enrichment logic, Threat reports and intelligence summaries, Hunt plans and post-hunt analysis, Metrics and dashboards demonstrating operational impact Champion technical excellence and documentation standards across the team Collaborate closely with SOC leadership, incident responders, and engineers to ensure team outputs drive measurable risk reduction Evaluate detection effectiveness and coverage using data-driven assessments Knowledge of detection engineering methodologies, including behavioral signature creation, enrichment logic, and telemetry correlation Familiarity with endpoint detection and response (EDR) telemetry (e.g., SentinelOne, CrowdStrike, Defender for Endpoint) and how adversary activity presents in those platforms Expertise in SIEM platforms such as Splunk (e.g., SPL query development, data models, correlation searches, macros, lookups, CIM normalization) Proficiency with data transformation and routing technologies such as CRIBL, including pipeline logic and field normalization strategies Quadrant is an affirmative action/equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, status as a protected veteran, or status as an individual with a disability. "Healthcare benefits are offered to all eligible employees according to compliance mandated by the Affordable Care Act". |