Chainalysis - Staff Threat Detection Engineer
Upload My Resume
Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT
Requirements
• Experience leading threat hunting in cloud-first or SaaS-heavy environments. • Familiarity with securing AI integrations and managing associated security risks. • Knowledge of blockchain ecosystems and threats specific to the Web3/Crypto space. • Prior experience in a Staff-level technical leadership or mentorship role. • Red teaming experience against web technologies • OSINT and investigations • Technologies we use: • SIEM, EDR, and Log Analytics platforms • MITRE ATT&CK Framework • Blockchain technology is powering a growing wave of innovation. Businesses and governments around the world are using blockchains to make banking more efficient, connect with their customers, and investigate criminal cases. As adoption of blockchain technology grows, more and more organizations seek access to all this ecosystem has to offer. That’s where Chainalysis comes in. We provide complete knowledge of what’s happening on blockchains through our data, services, and solutions. With Chainalysis, organizations can navigate blockchains safely and with confidence. • You belong here. • You belong here.
Responsibilities
• Lead Detection Strategy: Own the end-to-end roadmap for corporate threat detection, mapping coverage against frameworks like MITRE ATT&CK. • Engineeer High-Fidelity Detections: Design and maintain scalable detection logic across SIEM, EDR, and cloud logging platforms (AWS/GCP). • Conduct Threat Hunting: Plan and execute hypothesis-driven hunting campaigns to uncover novel TTPs and turn findings into durable controls. • Perform Risk Modeling: Lead threat assessments and design reviews for new technology on-boarding and product design changes. • Optimize Response: Partner with Incident Response to refine alert quality, automate triage playbooks, and reduce time-to-containment. • Mentor & Influence: Provide technical leadership and mentorship to the DaRE team while influencing product teams to improve visibility and remediate gaps. • We’re looking for candidates who have: • 8+ years of experience in detection engineering, SOC, or incident response at scale. • Deep expertise in building and tuning detections within SIEM, EDR, and log analytics platforms. • Advanced proficiency in writing complex detection queries (e.g., KQL, SPL, SQL). • Demonstrated experience detecting modern attacker TTPs across endpoint, identity, and cloud environments. • Strong scripting skills (Python, Bash) for automation and enrichment. • Proven ability to lead cross-functional security initiatives with IT and Engineering stakeholders.
Benefits
• Estimated base salary dependent on location & experience $175K – $240K • Offers Equity • Offers Bonus • Upload your resume here to autofill key application fields. • Drop your resume here! • Parsing your resume. Autofilling key fields... • or drag and drop here • Do not acknowledge • I don't wish to answer • Other, please specify • I don’t wish to answer • I am not a protected Veteran • I identify as one or more of the classifications of a protected veteran • Yes, I have a disability or have a history/ record of having a disability • No, I don’t have a disability or have a history/record of having a disability • Please let us know if we can improve our demographic definitions to be more inclusive. • Yes, I did feel this survey was inclusive • By uploading and submitting your information, you acknowledge receipt of our Applicant Privacy Policy. Our Applicant Privacy Policy explains how we use and protect your personal data. • Note: The consent period lasts for 2 years
No credit card. Takes 10 seconds.