Sr Security Engineer
New Yesterday
Sr Security Engineer
Washington DC
Pay From : $145,000/yr
MUST :
Experienced Sr Security Engineer
Active DoD Top Secret Clearance
7+ years of experience in Cyber Security
2+ years of experience in Cyber Threat Intelligence (CTI), Threat Hunting, Adversary Emulation, or Detection Engineering
2+ years of experience working as a lead of a team or project
Familiarity with SOC workflows, telemetry pipelines, and threat modeling
Background in writing formal technical reports with a focus on clarity, completeness, and audience relevance
Strong understanding of log sources across domains, including: Host-based logs (Windows Event Logs, Sysmon, EDR), Network telemetry (firewall, proxy, VPN, DNS, NDR), and Cloud logs (Azure AD, AWS CloudTrail, O365 Management Activity)
Well versed in Hypothesis-driven hunting, Behavior pattern detection and other threat hunting techniques
Ability to map cyber threat intelligence to technical detections, SOC coverage gaps, or architectural weaknesses
Familiarity with data routing/normalization platforms (e.g., CRIBL) is a plus
Excellent communication skills both written and verbal
Strong interpersonal skills with the ability to work well with Leadership and peers alike
Strong attention to details and solid documentation skills
Security certifications such as GCTI, GCFA, GREM, OSCP, or Splunk Certified Architect are a plus
Bachelor's Degree is required
DUTIES :
Lead and mentor a cross-functional team of CTI analysts, threat hunters, and detection engineers
Architect detection strategies based on emerging threats, adversary behaviors, and customer risk posture
Drive threat hunting operations to proactively identify undetected malicious activity
Translate threat intelligence reports and TTP analysis into actionable detections, telemetry gaps, and defensive measures
Oversee and ensure the accuracy, clarity, and timeliness of all team deliverables, including : Detection documentation and enrichment logic, Threat reports and intelligence summaries, Hunt plans and post-hunt analysis, Metrics and dashboards demonstrating operational impact
Champion technical excellence and documentation standards across the team
Collaborate closely with SOC leadership, incident responders, and engineers to ensure team outputs drive measurable risk reduction
Evaluate detection effectiveness and coverage using data-driven assessments
Knowledge of detection engineering methodologies, including behavioral signature creation, enrichment logic, and telemetry correlation
Familiarity with endpoint detection and response (EDR) telemetry (e.g., SentinelOne, CrowdStrike, Defender for Endpoint) and how adversary activity presents in those platforms
Expertise in SIEM platforms such as Splunk (e.g., SPL query development, data models, correlation searches, macros, lookups, CIM normalization)
Proficiency with data transformation and routing technologies such as CRIBL, including pipeline logic and field normalization strategies
Quadrant is an affirmative action/equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, status as a protected veteran, or status as an individual with a disability. "Healthcare benefits are offered to all eligible employees according to compliance mandated by the Affordable Care Act".
- Location:
- Washington, DC, United States
- Category:
- Computer And Mathematical Occupations