This role will support one or more direct or indirect contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday personnel working on the contracts be United States citizens (naturalized or native). Workday’s Cyber Defense Directorate protects enterprise and U.S. Government SaaS environments operating under multiple authorization boundaries, including air-gapped regions (AGR). Our Cyber Defense capability provides advanced monitoring, detection, threat hunting, and response across regulated cloud environments supporting federal customers. We operate in partnership with SOC, Red Team, Blue Team, Purple Team, and Threat Intelligence to ensure continuous validation of detection coverage and operational readiness. The Detection Engineering and Threat Hunting function is foundational to maintaining compliance, reducing adversary dwell time, and ensuring resilient security posture across high-security SaaS environments. The Threat Hunting & Detection Engineer is responsible for engineering, validating, and continuously improving detection capabilities across FedRAMP High and IL5 cloud-native SaaS environments, including air-gapped regions. This role develops high-fidelity detection logic leveraging: Splunk (correlation searches, data models, CIM alignment, SPL optimization) Cloud-native telemetry (AWS CloudTrail, GuardDuty, Inspector, VPC Flow Logs, SaaS application logs) Identity and access telemetry Endpoint and container telemetry Vulnerability intelligence sources You will translate adversary behaviors into actionable detection analytics aligned to MITRE ATT&CK and NIST SP 800-61r3 incident response lifecycle principles. You will support continuous monitoring requirements under FedRAMP and DoD IL5 frameworks, ensuring detection content aligns to compliance mandates, audit traceability, and evidentiary standards. In air-gapped environments, you will design detection strategies that account for: • Limited telemetry pathways • Constrained automation capabilities • Reduced external enrichment access • Secure data transfer controls You will collaborate closely with: SOC Analysts to improve alert quality and reduce false positives Security Engineers to ensure log integrity and coverage Red/Purple Teams to validate detection effectiveness Threat Intelligence to operationalize adversary reporting Compliance stakeholders to support audit and continuous monitoring requirements As the program matures, this role will help define detection engineering standards, lifecycle governance, and detection coverage metrics across the Cyber Defense Directorate. About You This role may require a security clearance at the TS/SCI w/CI Poly level. Applicants must have the ability to obtain and maintain a U.S. government issued security clearance. An active TS/SCI w/CI Poly is preferred You understand the intersection of detection engineering, cloud security, and regulatory frameworks. You can balance operational effectiveness with compliance rigor. You are comfortable operating in high-assurance, controlled, and sometimes disconnected environments where precision and auditability matter.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees