About The Position

We are seeking a highly motivated and experienced Detection Design Cyber Security Analyst to join our dynamic cybersecurity team. In this pivotal role, you will be instrumental in enhancing our threat detection capabilities by designing, driving implementation, and optimizing detection rules across our Security Information and Event Management (SIEM) platforms. You will play a key part in improving our incident response workflows and leveraging automation to streamline security operations.

Requirements

  • Proven Experience in detection engineering, security operations, or a related cybersecurity role
  • Hands-on experience with at least one major SIEM platform (Splunk, Microsoft Sentinel, or Google Chronicle) including rule development, query language proficiency, and content management
  • Familiarity with incident response processes and best practices
  • Practical experience with SOAR platforms for automation and workflow orchestration
  • Solid understanding of networking protocols, network architecture, and security devices (firewalls, proxies like Zscaler)
  • Excellent written and verbal communication skills in English, with the ability to effectively collaborate with technical and non-technical stakeholders
  • Demonstrated ability to work effectively within a team environment, sharing knowledge and supporting colleagues
  • Strong analytical and problem-solving skills with keen attention to detail
  • Eagerness to learn new technologies, adapt to evolving threats, and enhance skills through continuous professional development

Responsibilities

  • Design, develop, and drive implementation of robust detection rules within SIEM platforms such as Splunk, Microsoft Sentinel, or Google Chronicle to identify and alert malicious activities and security incidents
  • Continuously fine-tune existing detection rules to reduce false positives, increase accuracy, and ensure effective threat coverage
  • Utilize Security Orchestration, Automation, and Response (SOAR) platforms to automate repetitive security tasks, integrate security tools, and significantly reduce manual effort in incident investigation and response
  • Proactively collaborate with various stakeholders, including security operations, incident response, engineering, and business units, to gather requirements, integrate feedback, and collectively enhance our detection capabilities
  • Apply deep knowledge of cybersecurity and networking fundamentals—including traffic analysis, firewall configurations, proxy solutions (e.g., Zscaler), and core network protocols—to design and improve effective detections and identify anomalies, indicators of compromise, and emerging threats
  • Actively participate in ongoing professional development, stay abreast of the latest threat landscapes and detection techniques, and contribute to the team's collective knowledge and skills

Benefits

  • A hybrid working model, allowing for in-office / work from home flexibility
  • generous vacation, personal and volunteer days
  • Employee Resource Groups support an inclusive workplace for everyone and promote community engagement
  • Competitive compensation packages
  • health and wellbeing benefits
  • retirement savings plans
  • parental leave
  • family building benefits
  • Educational resources
  • matching gifts and volunteer programs
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service