Threat Detection Engineer

Location:
Tel Aviv, Israel
Scope:
Full-time
About the Role
Responsibilities
  • Threat Analysis and Research: Dive deep into terabytes of SaaS Application data to identify new attack vectors, emerging threats, and vulnerabilities across various attack surfaces.
  • Stay up-to-date with the latest cybersecurity trends and contribute to the development of cutting-edge threat detection methodologies.
  • Incident Investigation: Utilize your technical prowess to investigate complex SaaS & AI security incidents, analyzing data from diverse SaaS applications to uncover the root causes and methods of attack. 
  • False Positive Reduction: Leverage your expertise in data analysis and correlation to fine-tune detection rules and algorithms, minimizing false positives and enhancing the accuracy of our platform's threat alerts.
  • Thought Leadership and Community Engagement: Drive thought leadership initiatives by creating technical blog posts, delivering webinars, and speaking at conferences to share insights, educate the community, and enhance the company's reputation in the cybersecurity landscape.
  • Be at the forefront of the Reco mission and work closely with Reco customers regarding cyber security investigations and incidents detected in their environments
  • Collaborate with security researchers and data scientists to define new threat detection strategies based on SaaS attack vectors and industry trends.
  • Continuously monitor and analyze SaaS attack techniques, adapting security posture to evolving threats.
  • Work with APIs and integrations to ingest security logs from various SaaS platforms, correlating signals to detect real threats.
Requirements
  • A background of at least 5 years in cybersecurity, preferably in SOC, SIEM, Threat Intelligence, or Cloud Security
  • Experience with SaaS security challenges, such as shadow IT, OAuth risks, IDP misconfigurations, and excessive permissions.
  • Hands-on experience with security data analysis, including large-scale log processing, anomaly detection, and behavioral analytics.
  • Proficiency in SQL (e.g., ClickHouse) for querying security events and correlating threat indicators.
  • Strong understanding of identity-based attacks, insider threats, and SOC detection methodologies.
  • Familiarity with SIEM and XDR solutions (e.g., Splunk, Sentinel, Chronicle) and their role in modern detection engineering.
  • Strong problem-solving and analytical skills to triage security incidents and optimize detection rules.
  • Proficient in English (both written and spoken)

Advantages:

  • Familiarity with SaaS security best practices, including least-privilege access, OAuth governance, and SSPM.
  • Knowledge of SaaS security frameworks (e.g., SSPM, CASB).
  • Experience with IDP security (Okta, Azure AD, Google IAM) and detecting identity-related SaaS threats.
  • Hands-on experience with Threat Hunting and / or Detection engineering in SaaS environments.
  • Understanding of SaaS API security and experience analyzing integrations with third-party applications.
Apply for this Job
Max file size 10MB.
Uploading...
fileuploaded.jpg
Upload failed. Max size for files is 10 MB.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Ready for SaaS Security that can keep up?

Request a demo