×
Register Here to Apply for Jobs or Post Jobs. X

Senior Detection and Response Engineer

Job in Coos Bay, Coos County, Oregon, 97458, USA
Listing for: AlphaSense
Full Time position
Listed on 2026-02-07
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below

About Alpha Sense

The world’s most sophisticated companies rely on Alpha Sense to remove uncertainty from decision-making. With market intelligence and search built on proven AI, Alpha Sense delivers insights that matter from content you can trust. Our universe of public and private content includes equity research, company filings, event transcripts, expert calls, news, trade journals, and clients’ own research content.

The acquisition of Tegus by Alpha Sense in 2024 advances our shared mission to empower professionals to make smarter decisions through AI-driven market intelligence. Together, Alpha Sense and Tegus will accelerate growth, innovation, and content expansion, with complementary product and content capabilities that enable users to unearth even more comprehensive insights from thousands of content sets. Our platform is trusted by over 6,000 enterprise customers, including a majority of the S&P 500.

Founded in 2011, Alpha Sense is headquartered in New York City with more than 2,000 employees across the globe and offices in the U.S., U.K., Finland, India, Singapore, Canada, and Ireland. Come join us!

Location: Remote within USA

About

The Role

The Senior Detection and Response Engineer is a critical technical role responsible for driving the organization's defensive security capabilities across detection engineering, security orchestration, automation, and response (SOAR), and co-leading the organization's threat hunting program. This role is crucial for integrating new threat intelligence into high-fidelity detections and automating incident response processes to maximize team efficiency and response speed.

You'll work directly with the Director of Security Monitoring, Detection and Response and collaborate closely with the SOC Manager to co-lead threat hunting initiatives, while partnering with cross-functional security teams to build and scale our security operations capabilities.

About Our Security Team

You'll be joining a fast-paced security organization that emphasizes automation, engineering-driven approaches, and systematic problem-solving. Our team operates at the intersection of security operations, detection engineering, incident response, and infrastructure security. We value practical solutions, measurable outcomes, and continuous improvement.

What You’ll Do
  • Detection Engineering & Platform Leadership (40%)
    • Design, implement, and maintain advanced detection rules and correlation logic across SIEM, EDR, and Cloud platforms (AWS, GCP)
    • Lead detection strategy and architecture aligned with the Detection Quality frameworks
    • Write high-fidelity detection rules using languages like SIGMA and YARA-L
    • Conduct deep log source analysis, perform threat modeling, adversary emulation, and maintain MITRE ATT&CK mapping coverage
    • Conduct detection gap analysis to identify coverage opportunities across the kill chain
    • Create and maintain detection playbooks, runbooks, and comprehensive documentation
    • Perform detection quality assessments and continuous improvement initiatives
  • Security Automation (SOAR) & Response Leadership (40%)
    • Develop complex automated response playbooks for multi-stage incidents spanning multiple security tools
    • Integrate security tools via APIs (SIEM, EDR, MDM, CASB, ITSM, threat intelligence platforms)
    • Create automated enrichment pipelines incorporating threat intelligence, asset context, and user behavior analytics
    • Develop automated containment actions (account disable, host isolation, firewall rule updates)
    • Measure and report automation ROI, tracking metrics like time saved and incident handling efficiency
    • Handle Incident Response processes and procedures as needed
  • Threat Hunting Co-Leadership & Execution (20%)
    • Co-lead the organization's threat hunting program with the SOC Manager, defining strategy, methodology, and campaign planning
    • Execute proactive threat hunting campaigns by conducting hunt queries across SIEM and EDR platforms
    • Analyze large datasets to identify anomalous behavior patterns including user behavior, process execution, network traffic, and cloud activity
    • Develop hunting automation and tooling using custom Python scripts, Jupyter Notebooks, Osquery, and Velociraptor
    • Collabora…
  • Position Requirements
    10+ Years work experience
    To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary