
Tawantech
Senior Threat Detection Engineer
- Permanent
- Riyadh, Saudi Arabia
- Experience 2 - 5 yrs
Job expiry date: 26/05/2026
Job overview
Date posted
11/04/2026
Location
Riyadh, Saudi Arabia
Salary
Undisclosed
Compensation
Comprehensive package
Job description
Senior Threat Detection Engineer role within a cybersecurity environment in Riyadh responsible for designing, developing, and continuously improving threat detection capabilities across enterprise security monitoring platforms. The role focuses on SIEM engineering with strong emphasis on QRadar, detection logic development, and integration with security tools such as EDR and NDR to enhance threat visibility and response capabilities. The position involves translating threat intelligence, attack techniques, and business risks into actionable detection use cases aligned with frameworks such as MITRE ATT&CK and Cyber Kill Chain. Responsibilities include developing and maintaining correlation rules, alerting logic, thresholds, baselines, and behavioral analytics to detect multi-stage and complex cyberattacks. The role requires building detection use cases across endpoint, network, and application layers while integrating telemetry from multiple sources into SIEM platforms. The engineer is responsible for alert tuning, false positive reduction, and root cause analysis to ensure high-fidelity alerts and reduce SOC analyst fatigue. The position also supports threat hunting initiatives by collaborating with threat hunting teams, developing hypotheses, analyzing logs and telemetry data, and converting findings into scalable detection rules. The role includes QRadar platform optimization such as configuring log sources, parsing rules, event normalization, and ensuring SIEM performance and health. The candidate must maintain deep understanding of cyber threat landscapes, adversary behaviors, and security telemetry across enterprise environments while supporting continuous improvement of detection capabilities.
Required skills
Key responsibilities
- Design, develop, and deploy advanced SIEM detection use cases within QRadar or similar platforms to identify security threats, anomalies, and adversary behaviors
- Translate threat intelligence, attack techniques, and business risks into actionable detection logic aligned with MITRE ATT&CK and industry security frameworks
- Develop and maintain correlation rules, alerting logic, thresholds, and behavioral analytics to detect multi-stage and complex cyberattacks
- Integrate and analyze telemetry from EDR, NDR, endpoint, network, and application sources to enhance detection coverage and visibility
- Continuously tune alerts to reduce false positives, minimize alert fatigue, and improve detection accuracy through root cause analysis
- Collaborate with SOC and threat hunting teams to develop hypotheses, investigate indicators of compromise (IOCs), and identify suspicious behavior
- Convert threat hunting outputs into scalable detection use cases and enhance proactive threat detection capabilities across the organization
- Optimize SIEM platform performance including log source configuration, parsing rules, event normalization, and system health monitoring
Experience & skills
- Possess 3+ years of experience in cybersecurity with strong focus on SIEM engineering, threat detection engineering, or SOC operations
- Demonstrate hands-on experience designing and implementing SIEM detection use cases and correlation rules
- Exhibit strong experience with SIEM platforms, with QRadar strongly preferred for detection engineering and SOC monitoring
- Show experience working with EDR and NDR tools and developing detection logic across endpoint and network security platforms
- Maintain strong understanding of security event logs, network traffic analysis, and endpoint telemetry interpretation
- Demonstrate knowledge of cyber threat landscapes, attack techniques, adversary behaviors, and security frameworks such as MITRE ATT&CK and Cyber Kill Chain
- Exhibit experience in alert tuning, false positive reduction, and improving detection accuracy within SOC environments
- Possess strong analytical and problem-solving skills for identifying threats and improving security monitoring capabilities