Skip to content
  Thursday 19 June 2025
Trending
March 26, 2024TechRepublic’s Policy on Cloud Computing November 20, 2024CISA Adds Two Known Exploited Vulnerabilities to Catalog April 13, 2024Python Backdoor Used by Hackers in Zero-Day Attack on Palo Alto April 8, 2024Cybersecurity Engineer June 5, 2025As the world continues to grapple with the effects of climate change, it is becoming increasingly clear that action needs to be taken to mitigate its impacts. One of the most pressing issues is the need to reduce carbon emissions, which are a major contributor to global warming. Many countries and organizations have set ambitious targets to reduce their carbon footprint, but progress has been slow.<br /> <br /> One of the main challenges in reducing carbon emissions is the reliance on fossil fuels for energy production. Coal, oil, and natural gas are still the primary sources of energy for many countries, despite their negative environmental impact. Transitioning to renewable energy sources, such as solar, wind, and hydro power, is crucial in order to reduce carbon emissions and combat climate change.<br /> <br /> In addition to transitioning to renewable energy sources, it is also important to improve energy efficiency in industries, buildings, and transportation. By using energy more efficiently, we can reduce the amount of carbon emissions generated in the production and consumption of goods and services. This can be achieved through technological advancements, building design improvements, and changes in consumer behavior.<br /> <br /> Another key aspect of reducing carbon emissions is promoting sustainable practices in agriculture and land use. Deforestation, agriculture, and land degradation are major contributors to carbon emissions, but by implementing sustainable farming practices, reforestation efforts, and land conservation measures, we can help sequester carbon and reduce emissions.<br /> <br /> Ultimately, reducing carbon emissions requires a comprehensive and coordinated effort from governments, businesses, and individuals. By working together to transition to renewable energy sources, improve energy efficiency, and promote sustainable practices, we can make significant progress in reducing our carbon footprint and combating climate change. It is essential that we take action now to ensure a sustainable future for generations to come. October 18, 2023Why the CEO of Arctic Wolf is Acquiring a SOAR Vendor March 21, 2024Advantech WebAccess/SCADA | CISA November 16, 2024Unlock Essential Services & Commands: Your Ultimate Guide May 11, 2023BirdDog Cameras and Encoders | CISA December 11, 20232.5 Million Individuals Alerted About Data Breach in Kentucky Hospital Chain
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Senior Manager of Cybersecurity Detection Engineering
Careers

Senior Manager of Cybersecurity Detection Engineering

SecuredyouadmSecuredyouadm—May 7, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

The Senior Manager of Cybersecurity Detection Engineering will lead a team of Detection Engineers in designing, implementing, and maintaining advanced detection capabilities to safeguard the organization against emerging cyber threats. This pivotal role will enhance Cox Automotive’s next-generation Cyber Defense practice, enabling rapid threat response and automated remediation. The position will be responsible for developing the strategy for the Detection Engineering program and establishing metrics to demonstrate continuous improvement. The ideal candidate will possess expert-level knowledge in SIEM implementation and log ingestion, SOAR, Incident Response, and Threat Intelligence that will be data-driven with strong verbal, written communication, and leadership skills.Cybersecurity Detection Engineering:

  • Define detection engineering strategy, roadmap, and objectives to achieve.
  • Design and implement advanced threat detection techniques using tools such as SIEM, EDR, NDR, and SOAR platforms.
  • Develop innovative custom detection rules and automated remediation, playbooks, and alerts tailored to the organization’s threat landscape for enterprise and customer security.
  • Leverage industry standard MITRE frameworks to identify detection coverage and close gaps.
  • Monitor, optimize, and continuously improve detection systems for performance, scalability, and effectiveness.
  • Collaborates with Threat Detection and Response team to continuously improve cybersecurity capabilities in identification, management, and response to threats in the most efficient and effective manner.
  • Performs attack simulation testing to validate efficacy of use cases and purple teaming exercises collaborating with the Vulnerability Mgmt team.
  • Manages and maintains SIEM/Data Lake data management and log ingestion infrastructure in collaboration with Cyber Defense Engineering.
  • Evaluate, validate, tune, and sunset where necessary detection capabilities
  • Maintains operational guidelines, diagrams, and documentation for security detection and response.

Incident Response Support:

  • Collaborate with the incident response team to ensure rapid detection and containment of cyber threats.
  • Provide technical expertise and guidance to develop detection use cases during high-severity security incidents.
  • Continuously improve detection and response processes based on lessons learned from incidents.
  • Other duties may be assigned as needed to address new security threats facing the enterprise.
  • Provides off hour support as needed for security administration, detection, and response activities.
More stories

Cybersecurity Engineer

March 29, 2025

Cybersecurity Technical Specialist (Project Hire)

August 2, 2024

Cybersecurity Analyst

June 7, 2024

Cybersecurity Analyst (Hybrid)

August 5, 2024

Threat Intelligence Integration:

  • Leverage threat intelligence to enhance detection capabilities and proactively mitigate risks.
  • Identify and analyze new and emerging threat vectors and incorporate them into detection strategies.

Stakeholder Collaboration:

  • Partner with other Cybersecurity, Engineering, and Product teams to align detection strategies with organizational objectives.
  • Communicate detection capabilities and findings to technical and non-technical stakeholders, including executive leadership.

Governance and Compliance:

  • Ensure all detection processes and tools adhere to regulatory requirements and industry standards (e.g., GDPR, PCI-DSS, NIST).
  • Establish and maintain documentation of detection strategies, processes, and configurations.

Professional Technology Skills (the professional technology skills you need to be able to do the job)Ability to:

  • Proven track record of building scalable organizations that have world class threat detection capabilities.
  • Technical proficiency performing security investigations at scale; including endpoint, cloud, identity, network, and email threats.
  • Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoS Protection, Email systems, DLP, AV, and Endpoint security technologies.
  • Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms.
  • Apply security Threat Intelligence to identify new threat vectors.
  • Lead projects to improve security monitoring and response capabilities.
  • Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring.
  • Strong fundamentals of Linux, MacOS, and Windows operating system internals.
  • Demonstrate effective communication of security issues to management and others.
  • Maintain detection use case and SIEM configuration guidelines and standards for security.
  • Proficiency creating and managing operational metrics that increase team efficiency and quality.
  • Enthusiastic about managing and mentoring individuals pursuing careers in detection engineering.
  • Ability to manage effective relationships with organizational leaders, build a roadmap, and drive broad initiatives to completion.
  • Understanding of Machine Learning concepts as related to predictive analytics.

Knowledge, Experience & QualificationsEssential:

  • Bachelor’s degree in Computer Science or equivalent and 8+ years of industry related professional experience. The right candidate could also have a different combination, such as a master’s degree and 6 years’ experience; a Ph.D. and 3 years’ experience in a related field; or 20 years’ experience in a related field
  • Multi-cloud security experience AWS, Azure, GCP
  • Expert level knowledge on Detection Engineering and Security Operations
  • 3+ years of management or leadership experience with direct people management responsibilities
  • Strong experience with Information Security, Network Security, Security Monitoring, and Incident Response.
  • Strong experience with developing SIEM/SOAR detection and automation use cases.
  • Working experience with industry standard security technologies and services such as Threat Intelligence, Firewalls, SASE, IPS, Endpoint Security, DLP, SIEM/SOAR, and Data Lakes.
  • Expert level knowledge on the attack kill chain and diamond model.
  • 5+ years’ experience in an Incident Response or Security Operations role
  • 3+ years’ leadership experience in a SOC or equivalent role
  • Must live within a commutable distance to North Hills NY or Atlanta GA and be willing to come onsite 3x a week

Desirable:

  • GSEC, GCIA, GFE, GCFA, CISA, CISSP, CISM, or CIA certification(s)
  • Development/ Dev Ops / Engineering / Network / System Administration experience

USD 173,900.00 – 289,800.00Compensation:Compensation includes a base salary of $173,900.00 – $289,800.00. The base salary may vary within the anticipated base pay range based on factors such as the ultimate location of the position and the selected candidate’s knowledge, skills, and abilities. Position may be eligible for additional compensation that may include an incentive program.Benefits:The Company offers eligible employees the flexibility to take as much vacation with pay as they deem consistent with their duties, the company’s needs, and its obligations; seven paid holidays throughout the calendar year; and up to 160 hours of paid wellness annually for their own wellness or that of family members. Employees are also eligible for additional paid time off in the form of bereavement leave, time off to vote, jury duty leave, volunteer time off, military leave, and parental leave.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Senior Manager of Cybersecurity Detection Engineering
Senior Cybersecurity Integrated Architect
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Manager – Mainframe Security

June 18, 20250
Careers

Principal Cybersecurity

June 18, 20250
Careers

Fall 2025 Cybersecurity Undergraduate Internship

June 18, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Industry News

WormGPT Clones Hijack Popular AI Models to Thrive

June 18, 20250
Industry News

MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

June 18, 20250
Industry News

23andMe Hit with £2.31 Million Fine by ICO

June 18, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • World Leaks Uncovers Massive Data Breach at State Contractor!

  • Iran Cuts Internet Amid Rising Tensions

  • Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

  • WormGPT Clones Hijack Popular AI Models to Thrive

  • MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures