KeyStep

Security Engineer - Threat Detection

Stripe
Ireland
6 days ago
full-time8611 Security Analytics

Skills & Technologies

LinuxSplunkCloudmacOSSIEMDeploymentAutomation

Job Description

Who we are

About Stripe

Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world's largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone's reach while doing the most important work of your career.

About the team

The Proactive Threat team identifies, detects, and responds to threats before they impact Stripe's business or users. The Detection Engineering & Threat Hunting function sits at the intersection of offense and defense — we leverage deep knowledge of attacker tradecraft to build high-fidelity detections, hunt for sophisticated threats, and validate defensive capabilities across Stripe's critical systems.

We are builders first. Our team develops detection-as-code, automates analysis workflows, and builds tooling that scales detection and response across a complex, global environment. We partner closely with Threat Intelligence, Incident Response, and offensive security teams to ensure our detections are grounded in real-world adversary behavior.

The team is distributed across the United States (Eastern and Pacific time zones) and collaborates regularly with stakeholders across Stripe — including teams in Europe and Asia.

What you'll do

You will design, build, and maintain detections that identify malicious activity across Stripe's infrastructure, applications, and cloud environments. You'll leverage your understanding of attacker TTPs — from initial access through exfiltration — to develop detection logic that catches real threats while minimizing noise. Beyond writing detections, you'll conduct threat hunts, perform malware analysis, and build automation that enables detection engineering at scale.

Responsibilities

Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle

Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry

Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls

Perform malware analysis and reverse engineering to extract indicators and inform detection strategies

Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS

Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic

Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises

Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment

Map detection coverage to MITRE ATT&CK, identifying and prioritizing gaps across key attack surfaces

Lead projects, mentor teammates, and champion quality standards within the team

Who you are

We're looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.

Minimum requirements

5+ years of experience in detection engineering, threat hunting, or security operations

Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)

Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration

Ability to extract TTPs from threat intelligence reports and translate them into detection

Company & Role Analysis

JobSeeker+
Likely perks
Private MedicalPension25+ Days HolidayStock OptionsLearning BudgetFlexible Hours
Culture & working style

Neutral 2–4 sentence summary of what working at this company is like, drawn from public reviews and press coverage. Tone, collaboration style, pace, benefits highlights.

Market salary range

£45,000 – £60,000 (Glassdoor, Levels.fyi, 2025)

Unlock the full analysis for this job
Sign in to unlock →

Similar roles

See more
Databricks
Remote - California
Full-time
Remote
2 days ago

RDQ227R1176 While candidates in the listed location(s) are encouraged for this role, candidates in other locations (US based) will be consi…

View Job
Databricks
Amsterdam, Netherlands
Full-time
Remote
2 days ago

RDQ326R15 The Incident Response team's mission is to respond to security threats, incidents and investigations to protect our customers, em…

View Job
McGregor Boyall
London, UK
£90,000 – £110,000
Full-time
Hybrid
1 day ago

Network and Security Engineer - Cisco ACI - ISE - Checkpoint, ASA, Palo Alto - Meraki - BGP - OSPF - MPLS Permanent - up to £110,000 benefit…

View Job
Connected IT
Manchester, UK
£50,000 – £75,000
Full-time
1 day ago

We are currently recruiting multiple Senior Network Engineers / Architects to join a growing technical team. We have several vacancies avail…

View Job
McGregor Boyall
London, UK
£90,000 – £110,000
Full-time
Hybrid
2 days ago

Network and Security Engineer - Cisco ACI - ISE - Checkpoint, ASA, Palo Alto - Meraki - BGP - OSPF - MPLS Permanent - up to £110,000 + bene…

View Job
Apply NowApply with CV Improver