Engineering support areas
Detection Rule Development
Detection rule development and tuning. Native query languages (KQL, SPL, EQL), baseline testing, environment-specific optimization.
MITRE ATT&CK Mapping
Map detections to MITRE ATT&CK framework. Coverage gap analysis across tactics and techniques. Threat model-based prioritization.
Detection as Code
Detection-as-code implementation. Version control setup, testing pipelines, deployment automation. SIGMA rules for platform-agnostic logic and custom environment-specific rules.
Alert Tuning
Alert volume and accuracy analysis. Threshold adjustment, exclusion logic, detection refinement. False positive reduction while maintaining threat coverage.
Threat Hunting Content
Hunting query development and investigation procedures. Repeatable hunt development for persistent threats and emerging attack patterns.
Detection Testing
Testing framework setup with attack simulations and purple team exercises. Coverage validation and effectiveness measurement.
What you'll receive
Intelligence-driven detection
Threat Feed Integration
Integrate threat intelligence feeds into your SIEM. Configure feed parsers and enrichment workflows to add threat context to alerts.
Indicator Matching
Implement matching for known malicious IPs, domains, file hashes, and URLs. Configure automated enrichment and response actions.
Adversary-Focused Coverage
Map detection coverage to adversary groups relevant to your industry and region. Prioritize detection development based on threat actor TTPs.
Threat-Informed Hunting
Build hunting procedures from threat intelligence reports. Develop detection hypotheses based on observed adversary techniques and incident research.