The people here at Apple don’t just craft products — they build the kind of wonder that revolutionizes entire industries. It’s the diversity of those people and their ideas that inspires the innovation that runs through everything we do, including our approach to security. Join Apple, and help us protect the services that billions of customers rely on every day. The Detection team within Apple Services Engineering (ASE) is responsible for building advanced detections that protect approximately three-quarters of Apple’s systems and services. We achieve this by partnering closely with engineering teams to develop a deep technical understanding of how these systems operate, along with a comprehensive grasp of the threat landscape. This allows us to build state-of-the-art security detections that proactively defend against real-world attacks. We’re looking for a Detection Creation Engineer who combines deep security intuition with technical implementation skills. In this role, you’ll craft detection logic that catches active malicious activity across Apple’s infrastructure. You’ll need to think like an attacker, understand how malicious behaviors manifest in telemetry data, and translate that knowledge into high-fidelity detections that protect our customers. This is a hands-on technical role where you’ll write detection code in Scala Spark (Databricks notebooks) and configuration files for on-host detection systems (such as Falco rules). While we don’t require prior Scala experience, we do expect strong programming fundamentals and the curiosity to dive deep into new technologies. If you’re passionate about understanding attacker tradecraft and translating that knowledge into defensive capabilities, we’d love to hear from you! DESCRIPTION As a Detection Creation Engineer on the ASE Detection Team, you will: Develop security detections that identify active malicious activity across Apple’s services and infrastructure, implementing detection logic in Scala Spark (Databricks) and on-host detection frameworks (Falco rules) Analyze attacker behaviors and translate them into observable patterns across diverse telemetry sources including system call events, network logs, database access logs, endpoint security telemetry, Kubernetes audit logs, and other security-relevant data sources Collaborate with engineering teams to understand system architectures, identify detection opportunities, and develop detections that are both high-fidelity and operationally sustainable Tune and optimize detections based on real-world alert data, reducing false positives while maintaining coverage of malicious behaviors Operationalize detections by working with security operations teams to ensure alerts are actionable, triaged efficiently, and integrated into incident response workflows Document detection logic and rationale to enable knowledge sharing across the security organization
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees