Zum Hauptinhalt wechseln

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice

Senior Threat Detection Engineer

Job Category: Information Technology
Location: Poland - Krakow
Weiterempfehlen Über X teilen Über LinkedIn teilen Copying...

Meet Our Team:

As a member of the Cloud Security Operations Center (CSOC), you will play a critical role in the continuous monitoring, threat detection, and protection of Pega's global cloud infrastructure and applications. You will collaborate with a team of highly skilled security analysts, detection engineers, and incident responders who are committed to defending Pega Cloud against evolving cyber threats. This role offers the opportunity to work with cutting-edge security technologies including a sophisticated cloud-native SIEM, advanced threat intelligence platforms, and cloud-native security tools across various multi-cloud environments.

 

Picture Yourself at Pega:

Pega Cloud is a comprehensive, enterprise-grade SaaS platform that powers mission-critical CRM and business process management (BPM) applications for global organizations. As a Senior Detection Engineer, you will architect and implement advanced detection strategies, build high-fidelity security analytics, and develop automated response capabilities to proactively identify and mitigate threats targeting Pega Cloud infrastructure and customer environments. Your work will directly impact the security posture of both Pega's internal operations and the applications that our clients depend on daily. This position offers significant responsibility, strategic influence, and visibility across the organization's security program.

 

What You'll Do at Pega:

Detection Engineering
•    Design, develop, and deploy high-fidelity YARA-L detection rules in Google Security Operations (SecOps/Chronicle) based on threat intelligence, adversary TTPs mapped to MITRE ATT&CK framework, and threat hypotheses derived from the Pega threat landscape and attack surface analysis
•    Create advanced detection logic leveraging behavioral analytics, correlation rules, and multi-event sequences to identify sophisticated attack patterns across AWS, GCP, Kubernetes (EKS/GKE), and SaaS environments
•    Build interactive dashboards and real-time monitoring visualizations to enhance situational awareness and provide actionable security insights for the CSOC and stakeholders
•    Apply statistical modeling, data science methodologies, and machine learning techniques to identify anomalous behavior, outlier detection, and zero-day threat indicators across cloud telemetry and application logs
•    Assist the Threat Detection Operations team in developing Detection-as-Code practices, maintaining version-controlled detection repositories and automated testing frameworks to ensure detection reliability and consistency
•    Contribute to comprehensive investigation playbooks and runbooks for CSOC analysts to efficiently triage, investigate, and respond to high-confidence alerts, anomalous activity, and emerging threat scenarios
•    Serve as a technical authority on Google SecOps/Chronicle platform capabilities, YARA-L detection engineering, UDM (Unified Data Model) schema design, and advanced query techniques
•    Provide technical mentorship and training to CSOC analysts and detection engineers on YARA-L and UDM usage, Chronicle search methodologies, threat hunting techniques, and security data analysis
Detection Optimization & Tuning
•    Continuously review, validate, and refine existing detection rules and analytics based on feedback from the Digital Forensics and Incident Response (DFIR) team, false positive analysis, and threat landscape evolution
•    Conduct regular detection effectiveness assessments, measure key performance indicators (KPIs) including detection coverage, mean time to detect (MTTD), and alert precision metrics
•    Optimize detection logic to reduce alert fatigue while maintaining comprehensive threat coverage across the MITRE ATT&CK matrix, with emphasis on cloud-specific tactics and techniques
•    Collaborate with Security Engineering, Cloud Engineering, and IT teams to enhance log collection, data normalization, and telemetry enrichment for improved detection capabilities
•    Partner with the SIEM Engineering team and other stakeholders to ensure comprehensive logging coverage, identify visibility gaps, and recommend telemetry enhancements for critical assets and attack vectors
Proactive Threat Hunting
•    Execute hypothesis-driven threat hunts across Pega Cloud environments to proactively identify indicators of compromise (IOCs), adversary tradecraft, and persistence mechanisms that may evade automated detection systems
•    Conduct targeted threat hunting campaigns in response to emerging vulnerabilities, zero-day exploits, and threat intelligence reports affecting cloud infrastructure, containerized workloads, and SaaS applications
•    Translate threat hunting findings into actionable detection rules, threat intelligence artifacts, and security architecture improvements to strengthen defensive capabilities

 

Who You Are:

You have an insatiable curiosity with an inborn tenacity to research and determine how to detect adversarial activity.
•    Extensive experience building detections in AWS and GCP cloud environments
•    Extensive experience with performing investigations and threat hunts with Linux, Kubernetes, AWS EKS, and GCP GKE, and building detections for the same
•    Deep experience with the MITRE ATT&CK framework
•    Experience in development of technical documents for content creation, content/rule review processes
•    Solid foundational understanding of computer, OS, and network architecture concepts, particularly how various attacks exploit their weaknesses
•    Excellent verbal and written communication skills, including poise in high pressure situations
•    Have proven ability to work in a collaborative, cloud-first, client focused team environment

 

What You've Accomplished:

Must Have:
•    5+ years of experience in SOC Operations as a Threat Detection Engineer
•    3+ years of experience in detection engineering within the Google SecOps/Chronicle SIEM, specifically with a focus in writing YARA-L rules and utilizing the UDM schema
•    2+ years of experience building detections for AWS and/or GCP
•    Bachelor’s Degree in Cybersecurity, Computer Science, Data Science, or related field
•    A history of analyzing and resolving a range of high-pressure security issues within an enterprise organization 
•    Have earned SANS, Offensive Security, or other top tier industry recognized technical security certifications focused on detection/response or penetration testing

The Ideal Candidate Will Have:
•    Automation experience leveraging tool APIs, IDEs, and SDKs
•    Working experience with various AI tools such as Gemini, Copilot, and Anthropic
•    Proven ability to code and write scripts using YARA, Python, Bash, JavaScript, and Java
•    Identified security gaps to secure applications or products from would be attackers
•    Managed security solutions such as EDR/XDR and SIEM

 

Pega Offers You:

•    Gartner Analyst acclaimed technology leadership across our categories of products
•    Continuous learning and development opportunities 
•    An innovative, inclusive, agile, flexible, and fun work environment
•    Competitive global benefits program inclusive of pay + Bonus incentive and Employee Equity in the company

#LI-ME1

Additional Information

Base salary range for this role is 189,100 - 282,700 PLN annually. This role may also be eligible for annual bonus OR commission, as well as benefits and other incentives.

The final compensation will be determined during the offer process based on the candidate's education, experience, skills, and qualifications, as well as market conditions and may vary from the posted range. We will share an information on benefits, bonus/commission, and other pay components for this role at the relevant recruitment stage.

Job ID: 23438

AI in Action – Pega embraces the power of artificial intelligence. We encourage all employees to actively engage with AI technologies and continually explore ways to responsibly integrate AI into our products and processes. We may support parts of our recruitment process with automatic processing and, if required by law, you may in such cases have the right to request human intervention, challenge the outcome of such processing and comment on it.

Culture – At Pegasystems, we foster an environment where people feel valued and empowered to contribute their best. With global clients across industries and regions, we know our success depends on the unique perspectives, experiences, and talents of our people. Ours is a workplace where everyone can grow, collaborate, and deliver meaningful outcomes.

We encourage candidates from all backgrounds and experiences and focus on the core competencies and mindset needed to thrive in a role.

As an Equal Opportunity employer, Pegasystems will not discriminate in its employment practices due to an applicant's race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, veteran or disability status, or any other category protected by law.

Export Compliance – For positions requiring access to technical data subject to export control regulations such as this, Pegasystems may need to obtain export license approval from the U.S. Government and EU Authorities for certain individuals.

Accommodations – If you require reasonable accommodations under the Americans with Disabilities Act (US only) or comparable regional regulations in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please contact us here or contact (US only) 1-888-PEGA-NOW and/or 225 Wyman Street Waltham, MA 02451 ATTN: Benefits.

Labor Condition Applications
GDPR Candidate Privacy Notice
Pegasystems Limited UK Gender Pay Gap Statement
EEO/AA Policy Statement
Your Employee Rights Under the Family and Medical Leave Act
E-Verify Notice
Employee Polygraph Protection Act Rights

Apply Now

Already have an account? Log in.

  • 8 characters minimum
  • 1 number
  • 1 special character (!@#%$*+.)
  • 1 lowercase character
  • 1 uppercase character
By providing a password, you will become a Pega Digital Community Member and be able to track your application status

Required, allowed file types are DOC, DOCX, PDF, TXT (2MB max)

By clicking "Submit Application" I agree that I have read and agree to Pegasystems Privacy and Security Policy, Terms of Use, and Candidate Privacy Notice. If at any time I would like to opt-out of receiving text messages, I can text "stop" after receiving a text message from Pegasystems.
Weiterempfehlen Über X teilen Über LinkedIn teilen Copying...