wagey.ggwagey.ggv1.0-e93b95d-4-May
Browse Tech JobsCompaniesFeaturesPricingFAQs
Log InGet Started Free
Jobs/Security Engineer Role/celaralabs - Security Engineer – Detection & Visibility (QB - SE - 20260306)
celaralabs

celaralabs - Security Engineer – Detection & Visibility (QB - SE - 20260306)

Remote1mo ago
RemoteMidEMEACloud ComputingSecurity EngineerSecurity ArchitectAWSBashPythonElastic StackData Quality

Upload My Resume

Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT

Apply in One Click
Apply in One Click

Requirements

• 3+ years in security engineering, detection engineering, or a hands-on security operations role • Experience owning a SIEM end-to-end — not just using one • Comfort with AWS environments and a variety of log sources from cloud to apps to hosts • Ability to develop automation and scripts and build tooling (Python, Bash, or similar) • Strong instincts for what matters — you know the difference between noise and signal • Clear communicator who can brief a non-technical audience on threat posture • Experience with Sumo Logic or Elastic Stack • Familiarity with threat intelligence sources, dark web monitoring, or OSINT • Exposure to product/application telemetry and APM tooling

Responsibilities

• Own our threat awareness across every surface • Collect, monitor, filter, enrich, and relay external signals: dark web, threat feeds, CVEs, vendor advisories • Track what's happening inside: corporate systems, cloud infrastructure, IdP, messaging and communication, endpoints, and application behavior. • Be the first to know when something looks wrong — and be able to explain it clearly • Build a library of business cases for visibility and monitoring, then implement them. • Start with Sumo Logic, grow into Elastic • Take ownership of our Sumo Logic SIEM: collectors, pipelines, data quality, and detection logic • Work toward integrating our Elastic/APM stack to extend visibility into product and platform behavior • Tune signal over noise — don't just ingest everything, make what we have trustworthy • Build solutions where they don't exist • Extract security-relevant data from sources that weren't designed to provide it • Write scripts, build pipelines, and create custom solutions when tools don't cover the gap • Show daily progress — small improvements compound • Make visibility actionable • Brief leadership regularly on attack surface, unusual activity, and emerging threats • Translate technical signals into clear, decision-ready information • Identify problems early enough that we can act, not just react

Get Started Free

No credit card. Takes 10 seconds.

Privacy·Terms··Contact·FAQ·Wagey on X