Detection engineers build the rules and logic that identify malicious activity in an organization's environment. This role combines deep knowledge of attacker techniques with engineering discipline to create reliable, measurable detection coverage.
Great detection engineers treat detections like software - version-controlled, tested, and measured. They understand attacker tradecraft deeply enough to write rules that catch technique variations, not just specific tools, and they ruthlessly tune out false positives.
You're learning Sigma rule syntax, understanding log sources, and writing your first detections. Every false positive you investigate teaches you what normal looks like - which is essential for spotting abnormal.
Writing your first Sigma rules for script execution and process creation builds detection engineering fundamentals
Command and Scripting Interpreter (T1059), Windows Management Instrumentation (T1047)
Credential theft detections are high-value and teach you to work with authentication log sources
OS Credential Dumping (T1003), Brute Force (T1110)
Threat detection and analysis
250h study · 3yr validity · 50 CPE · $75/yr CE fee
SIEM fundamentals
100h study · 3yr validity · Free (retake exam)
Sign up free to explore these topics with AI-powered guidance.
You're measuring detection coverage against ATT&CK, testing detections in lab environments, and building CI/CD pipelines for detection-as-code. Your work directly reduces the mean time to detect threats.
Building detections for evasion techniques - process injection, log tampering - catches sophisticated attackers that evade basic rules
Process Injection (T1055), Indicator Removal (T1070)
Measuring detection coverage against ATT&CK persistence techniques reveals your most critical visibility gaps
Scheduled Task/Job (T1053), Registry Run Keys (T1547.001)
Network traffic analysis and intrusion detection
350h study · 4yr validity · 36 CPE · $479/yr
Sign up free to explore these topics with AI-powered guidance.
You're designing the detection engineering program - setting prioritization frameworks, defining metrics, and collaborating with CTI and IR teams to ensure detections stay aligned with the real threat landscape.
Designing detection strategies for post-compromise movement requires correlating events across multiple log sources
Remote Services (T1021), Use Alternate Authentication Material (T1550)
C2 detection engineering - DNS tunneling, protocol abuse, beaconing patterns - is among the most impactful and technically demanding work
Application Layer Protocol (T1071), DNS (T1071.004)
Security operations management
300h study · 4yr validity · 36 CPE · $479/yr
Security leadership and governance
400h study · 3yr validity · 40 CPE · $125/yr AMF
Sign up free to explore these topics with AI-powered guidance.
Free to use. No credit card required.
Get Started FreeAsk your first question in seconds.