<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>c2aaf7ac-804</externalid>
      <Title>Security Engineer - Threat Detection</Title>
      <Description><![CDATA[<p><strong>Job Description</strong></p>
<p>You will design, build, and maintain detections that identify malicious activity across Stripe&#39;s infrastructure, applications, and cloud environments.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle</li>
<li>Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry</li>
<li>Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls</li>
<li>Perform malware analysis and reverse engineering to extract indicators and inform detection strategies</li>
<li>Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS</li>
<li>Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic</li>
<li>Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises</li>
<li>Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment</li>
<li>Map detection coverage to MITRE ATT&amp;CK, identifying and prioritizing gaps across key attack surfaces</li>
<li>Lead projects, mentor teammates, and champion quality standards within the team</li>
</ul>
<p><strong>Requirements</strong></p>
<ul>
<li>5+ years of experience in detection engineering, threat hunting, or security operations</li>
<li>Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)</li>
<li>Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration</li>
<li>Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities</li>
<li>Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)</li>
<li>Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources</li>
<li>Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)</li>
<li>Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences</li>
<li>Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments</li>
<li>Background in malware analysis, reverse engineering, or threat research</li>
<li>Experience with purple team operations , collaborating with offensive security to validate detections</li>
<li>Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis</li>
<li>Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows</li>
<li>Interest in agentic automation , using LLMs to augment hunting, tuning, or triage</li>
<li>Experience with detection validation tools (Atomic Red Team, ATT&amp;CK Evaluations)</li>
<li>Contributions to open-source detection content, research, or conference presentations</li>
<li>Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM</li>
</ul>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>remote</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>detection engineering, threat hunting, security operations, SIEM platforms, adversary tradecraft, network-based detections, endpoint-based detections, telemetry analysis, detection/query languages, programming, communication skills, fintech, financial services, malware analysis, reverse engineering, purple team operations, big data platforms, AI/LLM-assisted development tools, agentic automation, detection validation tools, open-source detection content, relevant certifications</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Stripe</Employername>
      <Employerlogo>https://logos.yubhub.co/stripe.com.png</Employerlogo>
      <Employerdescription>Stripe is a financial infrastructure platform for businesses, used by millions of companies worldwide.</Employerdescription>
      <Employerwebsite>https://stripe.com/</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://job-boards.greenhouse.io/stripe/jobs/7827230</Applyto>
      <Location>Ireland</Location>
      <Country></Country>
      <Postedate>2026-04-18</Postedate>
    </job>
  </jobs>
</source>