The Security & Detection Engineering Manager is responsible for owning and leading the detection engineering and security platform strategy across a multi-SIEM, multi-tenant MSSP environment.
This role governs detection architecture, ATT&CK coverage, platform interoperability, multi-tenant isolation, cost engineering, quality assurance and automation governance across a hybrid tooling environment.
Requirements
1. Detection Strategy & Architecture
-
Define and maintain a 12–24 month Detection Engineering Roadmap.
-
Own adversary-aligned detection strategy mapped to MITRE ATT&CK.
-
Establish detection maturity targets per platform and service tier.
-
Maintain a centralised detection content abstraction model (e.g., Sigma/internal DSL).
-
Govern detection lifecycle: design validation deployment tuning retirement.
-
Prevent detection sprawl and duplication across platforms.
2. MITRE ATT&CK Coverage Governance
-
Maintain formal ATT&CK coverage matrix.
-
Track and report coverage percentage by tactic and technique.
-
Conduct quarterly coverage gap analysis.
-
Validate detection coverage through simulation and adversary emulation exercises.
-
Produce ATT&CK coverage reporting for executive leadership and audit functions.
3. Multi-Tenant Detection Governance
-
Define detection inheritance and baseline models across tenants.
-
Govern tenant-level tuning while preserving engineering consistency.
-
Enforce strict cross-tenant rule isolation and data scoping controls.
-
Maintain metadata-only forwarding controls where required for sovereignty models.
-
Prevent cross-tenant configuration contamination.
-
Maintain version control and tenant-level detection lineage.
4. Platform Interoperability & Schema Governance
-
Own cross-platform detection portability strategy.
-
Govern schema alignment across a multi-SIEM environment
-
Define translation and normalisation pipelines.
-
Ensure detection parity across supported platforms.
-
Govern ingestion mapping and telemetry integrity.
5. Cost Engineering & Optimisation
-
Own ingestion efficiency model and cost per GB governance.
-
Monitor cost per alert generated.
-
Optimise:
-
Retention tiers (hot/warm/cold)
-
Query performance
-
Rule execution frequency
-
Define and track detection efficiency (signal-to-noise ratio).
-
Contribute to platform licensing and cost optimisation decisions.
6. Detection Quality Assurance Framework
-
Establish formal Detection QA process including:
-
Peer review prior to deployment
-
Pre-production validation environment
-
False positive regression testing
-
Simulation-based testing
-
Implement detection health scoring system.
-
Track detection decay and stale logic.
-
Maintain detection change traceability.
7. Continuous Service Improvement
-
Establish structured SOC-to-Engineering feedback loop.
-
Conduct regular analyst review sessions.
-
Track false positive patterns and alert fatigue metrics.
-
Maintain closed-loop improvement tracking.
-
Continuously improve detection fidelity and SOC effectiveness.
-
Conduct post-incident detection and control gap analysis.
8. Automation & Response Engineering Governance
-
Govern SOAR and response automation across platforms.
-
Define tiered automation model (manual / assisted / autonomous).
-
Establish human-in-the-loop controls for high-risk actions.
-
Enforce automation regression testing and version control.
-
Monitor automation success and failure rates.
9. Preventative Control Operationalisation & Validation
-
Implement Security Architect–approved hardening baselines (CIS-aligned).
-
Operationalise secure configuration standards across:
-
Endpoints
-
Identity platforms
-
Cloud environments
-
Network security controls
-
Monitor configuration drift and control degradation.
-
Integrate preventative control telemetry into SIEM and detection pipelines.
-
Validate control effectiveness using detection and incident data.
-
Provide structured feedback to the Security Architect on control performance gaps.
-
Support exposure reduction initiatives through engineering execution.
10. Compliance & Audit Evidence Ownership
-
Maintain full audit trail for detection changes.
-
Provide evidence for ISO 27001, NIST CSF and regional regulatory audits.
-
Maintain detection version history.
-
Ensure automated response actions are logged and traceable.
-
Maintain control compliance dashboards and operational metrics.
-
Provide ATT&CK coverage documentation to auditors.
11. Engineering Leadership & Capability Development
-
Define detection engineering competency framework.
-
Mentor and develop Detection Engineers and SIEM Engineers.
-
Establish certification roadmap (Elastic, Microsoft, Google).
-
Implement technical performance scorecards.
-
Develop succession planning and redundancy controls.
-
Maintain backlog governance and engineering delivery cadence.
Technical Requirements
Platform Expertise (Required)
-
Elastic Security (EQL, index lifecycle, ECS governance)
-
Microsoft Defender XDR & Sentinel (KQL, ASIM)
Platform Expertise (Desired)
-
Google SecOps (UDM schema, detection engineering)
-
BindPlane (log routing and telemetry aggregation architecture)
Detection Engineering
-
Behaviour-based detection design
-
Correlation engineering
-
Sigma rule governance
-
Detection-as-code practices
-
ATT&CK mapping and coverage measurement
Automation & Engineering
-
SOAR workflow design
-
Python / PowerShell scripting
-
CI/CD for detection content
-
API integrations (REST/JSON)
-
Infrastructure-as-Code fundamentals
Preventative Control Engineering
-
Implement and operationalise architect-approved hardening baselines (CIS-aligned) across endpoints, identity, cloud and network environments.
-
Monitor configuration drift and validate control effectiveness using telemetry integrated into SIEM platforms.
-
Enforce tenant-level configuration isolation and prevent cross-tenant control contamination in multi-tenant environments.
-
Translate architectural security controls into enforceable technical configurations and measurable compliance outcomes.
-
Maintain automated control validation, regression testing and compliance-ready reporting for regulatory and audit purposes.
Data & Schema Governance
-
Log normalisation and parsing
-
Schema conformity validation
-
Ingestion health monitoring
-
Data completeness validation
Experience Requirements
-
7+ years in security engineering or detection engineering
-
2+ years in technical leadership or management
-
Experience in MSSP or multi-tenant SOC environments
-
Proven experience with at least two of:
-
Elastic
-
Microsoft Security Suite
-
Google SecOps
-
Experience implementing ingestion frameworks (BindPlane or equivalent/ Native Collectors)
Key Performance Indicators
Detection Effectiveness
-
ATT&CK coverage percentage
-
Detection fidelity score
-
False positive rate
-
Missed detection rate
-
Detection decay rate
Operational Performance
-
Mean Time to Detect (MTTD)
-
Mean Time to Respond (MTTR)
-
Detection deployment lead time
-
Detection retirement cycle time
Cost & Efficiency
-
Cost per GB ingested
-
Cost per alert generated
-
Query efficiency score
-
Storage optimisation ratio
Quality & Governance
-
Detection QA pass rate
-
Automation success rate
-
Automation failure rate
-
Schema conformity percentage
-
Ingestion failure rate
Engineering Leadership
-
Backlog delivery velocity
-
Certification completion rate
-
Cross-platform detection parity percentage