Skip to content
  Thursday 19 June 2025
Trending
February 16, 2024AWS Exploited by Malicious ‘SNS Sender’ Script for Large-Scale Smishing Attacks October 31, 2024Sr Director Cybersecurity – Vigilance and Defense May 9, 2024Cybersecurity Ops April 12, 2024Big Tech warned by UK Markets Authority of potential AI market domination December 10, 2024Cleo File Transfer Vulnerability Exploited – Act Now! September 15, 2023Cybersecurity Intel Analyst (TS/SCI Clearance Required) May 27, 2025RMF/ISSO Cybersecurity Engineer January 22, 2025The importance of mental health awareness has been increasing in recent years as society begins to recognize the impact that mental health issues can have on individuals. It is crucial to understand that mental health is just as important as physical health and should be treated with the same level of care and attention. By raising awareness about mental health, we can reduce the stigma surrounding it and encourage individuals to seek help when needed.<br /> <br /> One of the key reasons why mental health awareness is important is because it can help to prevent mental health issues from escalating. By educating people about the signs and symptoms of mental health conditions, we can help individuals recognize when they may need support and encourage them to seek help early on. This can ultimately lead to quicker interventions and better outcomes for those struggling with mental health issues.<br /> <br /> Additionally, mental health awareness can help to reduce the stigma and discrimination that is often associated with mental illness. By promoting open discussions about mental health, we can help to break down the barriers that prevent people from seeking help and create a more supportive environment for those struggling with mental health issues. This can help to improve the overall well-being of individuals and communities.<br /> <br /> Furthermore, mental health awareness can also help to increase access to mental health services and resources. By raising awareness about the importance of mental health, we can advocate for better funding and support for mental health services, as well as work to reduce barriers to accessing care. This can help to ensure that individuals receive the help they need in a timely manner and prevent mental health issues from worsening.<br /> <br /> In conclusion, mental health awareness plays a crucial role in promoting overall well-being and reducing the impact of mental health issues on individuals and communities. By raising awareness about mental health, we can help to prevent mental health issues from escalating, reduce stigma and discrimination, and increase access to mental health services. It is important for individuals, communities, and society as a whole to prioritize mental health awareness and work towards creating a more supportive and understanding environment for those struggling with mental health issues. March 2, 2025Cybersecurity Engineer January 29, 2024Artificial Intelligence Emerges as a Crucial Weapon Against Cyber Threats
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Senior Manager of Cybersecurity Detection Engineering
Careers

Senior Manager of Cybersecurity Detection Engineering

SecuredyouadmSecuredyouadm—May 7, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

The Senior Manager of Cybersecurity Detection Engineering will lead a team of Detection Engineers in designing, implementing, and maintaining advanced detection capabilities to safeguard the organization against emerging cyber threats. This pivotal role will enhance Cox Automotive’s next-generation Cyber Defense practice, enabling rapid threat response and automated remediation. The position will be responsible for developing the strategy for the Detection Engineering program and establishing metrics to demonstrate continuous improvement. The ideal candidate will possess expert-level knowledge in SIEM implementation and log ingestion, SOAR, Incident Response, and Threat Intelligence that will be data-driven with strong verbal, written communication, and leadership skills.Cybersecurity Detection Engineering:

  • Define detection engineering strategy, roadmap, and objectives to achieve.
  • Design and implement advanced threat detection techniques using tools such as SIEM, EDR, NDR, and SOAR platforms.
  • Develop innovative custom detection rules and automated remediation, playbooks, and alerts tailored to the organization’s threat landscape for enterprise and customer security.
  • Leverage industry standard MITRE frameworks to identify detection coverage and close gaps.
  • Monitor, optimize, and continuously improve detection systems for performance, scalability, and effectiveness.
  • Collaborates with Threat Detection and Response team to continuously improve cybersecurity capabilities in identification, management, and response to threats in the most efficient and effective manner.
  • Performs attack simulation testing to validate efficacy of use cases and purple teaming exercises collaborating with the Vulnerability Mgmt team.
  • Manages and maintains SIEM/Data Lake data management and log ingestion infrastructure in collaboration with Cyber Defense Engineering.
  • Evaluate, validate, tune, and sunset where necessary detection capabilities
  • Maintains operational guidelines, diagrams, and documentation for security detection and response.

Incident Response Support:

  • Collaborate with the incident response team to ensure rapid detection and containment of cyber threats.
  • Provide technical expertise and guidance to develop detection use cases during high-severity security incidents.
  • Continuously improve detection and response processes based on lessons learned from incidents.
  • Other duties may be assigned as needed to address new security threats facing the enterprise.
  • Provides off hour support as needed for security administration, detection, and response activities.
More stories

Supervisor, Cybersecurity

April 22, 2024

Director, Cybersecurity Remediation Management

June 13, 2024

Cybersecurity Engineer SME

September 25, 2024

Cybersecurity Analyst

March 21, 2024

Threat Intelligence Integration:

  • Leverage threat intelligence to enhance detection capabilities and proactively mitigate risks.
  • Identify and analyze new and emerging threat vectors and incorporate them into detection strategies.

Stakeholder Collaboration:

  • Partner with other Cybersecurity, Engineering, and Product teams to align detection strategies with organizational objectives.
  • Communicate detection capabilities and findings to technical and non-technical stakeholders, including executive leadership.

Governance and Compliance:

  • Ensure all detection processes and tools adhere to regulatory requirements and industry standards (e.g., GDPR, PCI-DSS, NIST).
  • Establish and maintain documentation of detection strategies, processes, and configurations.

Professional Technology Skills (the professional technology skills you need to be able to do the job)Ability to:

  • Proven track record of building scalable organizations that have world class threat detection capabilities.
  • Technical proficiency performing security investigations at scale; including endpoint, cloud, identity, network, and email threats.
  • Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoS Protection, Email systems, DLP, AV, and Endpoint security technologies.
  • Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms.
  • Apply security Threat Intelligence to identify new threat vectors.
  • Lead projects to improve security monitoring and response capabilities.
  • Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring.
  • Strong fundamentals of Linux, MacOS, and Windows operating system internals.
  • Demonstrate effective communication of security issues to management and others.
  • Maintain detection use case and SIEM configuration guidelines and standards for security.
  • Proficiency creating and managing operational metrics that increase team efficiency and quality.
  • Enthusiastic about managing and mentoring individuals pursuing careers in detection engineering.
  • Ability to manage effective relationships with organizational leaders, build a roadmap, and drive broad initiatives to completion.
  • Understanding of Machine Learning concepts as related to predictive analytics.

Knowledge, Experience & QualificationsEssential:

  • Bachelor’s degree in Computer Science or equivalent and 8+ years of industry related professional experience. The right candidate could also have a different combination, such as a master’s degree and 6 years’ experience; a Ph.D. and 3 years’ experience in a related field; or 20 years’ experience in a related field
  • Multi-cloud security experience AWS, Azure, GCP
  • Expert level knowledge on Detection Engineering and Security Operations
  • 3+ years of management or leadership experience with direct people management responsibilities
  • Strong experience with Information Security, Network Security, Security Monitoring, and Incident Response.
  • Strong experience with developing SIEM/SOAR detection and automation use cases.
  • Working experience with industry standard security technologies and services such as Threat Intelligence, Firewalls, SASE, IPS, Endpoint Security, DLP, SIEM/SOAR, and Data Lakes.
  • Expert level knowledge on the attack kill chain and diamond model.
  • 5+ years’ experience in an Incident Response or Security Operations role
  • 3+ years’ leadership experience in a SOC or equivalent role
  • Must live within a commutable distance to North Hills NY or Atlanta GA and be willing to come onsite 3x a week

Desirable:

  • GSEC, GCIA, GFE, GCFA, CISA, CISSP, CISM, or CIA certification(s)
  • Development/ Dev Ops / Engineering / Network / System Administration experience

USD 173,900.00 – 289,800.00Compensation:Compensation includes a base salary of $173,900.00 – $289,800.00. The base salary may vary within the anticipated base pay range based on factors such as the ultimate location of the position and the selected candidate’s knowledge, skills, and abilities. Position may be eligible for additional compensation that may include an incentive program.Benefits:The Company offers eligible employees the flexibility to take as much vacation with pay as they deem consistent with their duties, the company’s needs, and its obligations; seven paid holidays throughout the calendar year; and up to 160 hours of paid wellness annually for their own wellness or that of family members. Employees are also eligible for additional paid time off in the form of bereavement leave, time off to vote, jury duty leave, volunteer time off, military leave, and parental leave.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Zero-Day Ransomware Attack hits U.S. Organization via Windows CVE-2025-29824
Senior Manager of Cybersecurity Detection Engineering
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Manager – Mainframe Security

June 18, 20250
Careers

Principal Cybersecurity

June 18, 20250
Careers

Fall 2025 Cybersecurity Undergraduate Internship

June 18, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Linux Vulnerabilities Allow Full Root Access on Popular Distributions

June 19, 20250
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Industry News

WormGPT Clones Hijack Popular AI Models to Thrive

June 18, 20250
Industry News

MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

June 18, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Linux Vulnerabilities Allow Full Root Access on Popular Distributions
  • World Leaks Uncovers Massive Data Breach at State Contractor!

  • Iran Cuts Internet Amid Rising Tensions

  • Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

  • WormGPT Clones Hijack Popular AI Models to Thrive

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures