
Staff Threat Research Engineer
Sumo Logic
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Salary
💰 $162,000 - $190,000 per year
Job Level
About the role
- Conduct and lead both applied and original threat research, transforming intelligence, telemetry, and investigation into actionable detection logic for the Sumo Logic SIEM.
- Collaborate closely within Threat Labs to design, build, and refine detection content and validation pipelines that raise the bar for product and customer detection quality.
- Drive innovation in detection methodologies, including research activities such as malware analysis, infrastructure tracking, or honeypot operations, to discover new attacker behaviors.
- Publish and share findings — from detection logic to behavioral analysis and practical hunting guidance — that help customers maximize SIEM outcomes.
- Contribute to Threat Labs’ long‑term vision of a research‑driven, continuously evolving detection ecosystem built on practitioner insight and technical depth.
- Research, develop, and test threat detection logic in a lab environment, validating against real‑world attacker behaviors and ensuring technical alignment with Sumo Logic SIEM capabilities.
- Conduct original threat research, such as analyzing malware, tracking infrastructure, or experimenting with honeypots, and translate findings into detection opportunities.
- Investigate industry and adversary trends to identify emerging detection opportunities.
- Collaborate with product management and fellow Threat Labs engineers to scope and prioritize detection campaigns.
- Maintain and expand Threat Labs’ research lab infrastructure.
- Provide practitioner feedback to engineering and product management to inform feature design and roadmap decisions.
- Contribute to the security community through blogs, conference talks, open source projects, and public research contributions.
Requirements
- 12+ years of cybersecurity experience that includes a mix of:
- Senior/Principal SOC analyst, threat hunter, or purple team practitioner
- Incident responder or detection engineer roles
- Demonstrated ability to progress threat research into actionable detections and incident response outcomes.
- Experience conducting original or self‑directed threat research that resulted in novel findings — for example, malware or infrastructure analysis, honeypot operations, or similar investigative work leading to actionable insights.
- Broad knowledge of multiple technology stacks and a strong curiosity to learn new platforms.
- Deep experience with multiple major public clouds (AWS, Azure, or GCP), and familiarity with analyzing cloud‑native logs and telemetry.
- Understanding of emerging attack techniques targeting AI infrastructure and machine learning pipelines (e.g., data poisoning, model theft, or prompt injection), and familiarity with frameworks such as MITRE ATLAS.
- Proven history of thought leadership through blogs, LinkedIn articles, or conference presentations.
- Background in the cybersecurity vendor space, with experience providing expert feedback to product and engineering teams.
- Prior experience in customer-facing technical roles (consulting, remote support, or advisory).
- Hands‑on familiarity with offensive security tools (Atomic Red Team, Sliver, Cobalt Strike, etc.).
- Scripting or automation capability (Python, PowerShell, etc.).
- Experience with Security Orchestration, Automation, and Response (SOAR) technology.
- Recognized presence or active participation in the security community (e.g., X/Twitter, conferences, open source).
- Experience applying AI or machine learning techniques to improve operational efficiency and automation across the detection rule development lifecycle — from research and validation to deployment and tuning.
Benefits
- health insurance
- retirement plans
- flexible work arrangements
- professional development
- bonuses
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat researchmalware analysisinfrastructure trackinghoneypot operationsdetection logicincident responsescriptingautomationAI techniquesmachine learning
Soft Skills
collaborationthought leadershipcommunicationcuriosityfeedback provisioncustomer-facinginnovationresearch-driventechnical depthprioritization