Stripe

Security Engineer - Threat Detection

Stripe
remote senior full-time Ireland
Apply →

First indexed 18 Apr 2026

Description

Job Description

You will design, build, and maintain detections that identify malicious activity across Stripe's infrastructure, applications, and cloud environments.

Responsibilities

  • Design, build, and tune high-fidelity detections across modern SIEM platforms, covering adversary TTPs across the full attack lifecycle
  • Develop detection hypotheses by researching TTPs, identifying evidence sources, and determining detection opportunities across available telemetry
  • Conduct hypothesis-driven threat hunts to identify malicious activity, uncover detection gaps, and validate security controls
  • Perform malware analysis and reverse engineering to extract indicators and inform detection strategies
  • Build network-based detections (flow, pcap, protocol analysis) and endpoint-based detections (event logs, EDR telemetry, memory/file artifacts) across Windows, Linux, and macOS
  • Partner with Threat Intelligence to operationalize intel reports into detections, hunting leads, and enrichment logic
  • Collaborate with IR, SOC, and offensive security teams to validate and refine detections based on real-world incidents and red team exercises
  • Build data pipelines, automation, and tooling that enable detection-as-code practices and scalable deployment
  • Map detection coverage to MITRE ATT&CK, identifying and prioritizing gaps across key attack surfaces
  • Lead projects, mentor teammates, and champion quality standards within the team

Requirements

  • 5+ years of experience in detection engineering, threat hunting, or security operations
  • Demonstrated experience writing detection logic in modern SIEM platforms (e.g., Splunk, Chronicle, Elastic, CrowdStrike NG-SIEM, Panther, Microsoft Sentinel)
  • Strong understanding of adversary tradecraft across the attack lifecycle: initial access, privilege escalation, lateral movement, defense evasion, persistence, and exfiltration
  • Ability to extract TTPs from threat intelligence reports and translate them into detection opportunities
  • Experience developing network-based and endpoint-based detections across multiple OS platforms (Windows, Linux, macOS)
  • Experience analyzing telemetry across endpoint, network, cloud (AWS/GCP/Azure), identity, and application log sources
  • Proficiency in detection/query languages (SPL, KQL, EQL, YARA-L, SQL) and programming (Python or similar)
  • Strong communication skills with the ability to document detection logic and explain findings to technical and non-technical audiences
  • Adversarial mindset , understanding how attackers operate to build detections that catch real-world threats

Preferred Qualifications

  • Experience in detection engineering or threat hunting within fintech, financial services, or highly regulated environments
  • Background in malware analysis, reverse engineering, or threat research
  • Experience with purple team operations , collaborating with offensive security to validate detections
  • Familiarity with big data platforms (Databricks, Trino, PySpark) for large-scale log analysis
  • Proficiency with AI/LLM-assisted development tools (Claude Code, Cursor, GitHub Copilot) applied to detection workflows
  • Interest in agentic automation , using LLMs to augment hunting, tuning, or triage
  • Experience with detection validation tools (Atomic Red Team, ATT&CK Evaluations)
  • Contributions to open-source detection content, research, or conference presentations
  • Relevant certifications such as HTB CDSA, GCIH, GCFA, GNFA, OSCP, TCM PMAT, or GREM
This listing is enriched and indexed by YubHub. To apply, use the employer's original posting: https://job-boards.greenhouse.io/stripe/jobs/7827230