Sumo Logic

Staff Threat Research Engineer

Sumo Logic

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $162,000 - $190,000 per year

Job Level

About the role

  • Conduct and lead both applied and original threat research, transforming intelligence, telemetry, and investigation into actionable detection logic for the Sumo Logic SIEM.
  • Collaborate closely within Threat Labs to design, build, and refine detection content and validation pipelines that raise the bar for product and customer detection quality.
  • Drive innovation in detection methodologies, including research activities such as malware analysis, infrastructure tracking, or honeypot operations, to discover new attacker behaviors.
  • Publish and share findings — from detection logic to behavioral analysis and practical hunting guidance — that help customers maximize SIEM outcomes.
  • Contribute to Threat Labs’ long‑term vision of a research‑driven, continuously evolving detection ecosystem built on practitioner insight and technical depth.
  • Research, develop, and test threat detection logic in a lab environment, validating against real‑world attacker behaviors and ensuring technical alignment with Sumo Logic SIEM capabilities.
  • Conduct original threat research, such as analyzing malware, tracking infrastructure, or experimenting with honeypots, and translate findings into detection opportunities.
  • Investigate industry and adversary trends to identify emerging detection opportunities.
  • Collaborate with product management and fellow Threat Labs engineers to scope and prioritize detection campaigns.
  • Maintain and expand Threat Labs’ research lab infrastructure.
  • Provide practitioner feedback to engineering and product management to inform feature design and roadmap decisions.
  • Contribute to the security community through blogs, conference talks, open source projects, and public research contributions.

Requirements

  • 12+ years of cybersecurity experience that includes a mix of:
  • Senior/Principal SOC analyst, threat hunter, or purple team practitioner
  • Incident responder or detection engineer roles
  • Demonstrated ability to progress threat research into actionable detections and incident response outcomes.
  • Experience conducting original or self‑directed threat research that resulted in novel findings — for example, malware or infrastructure analysis, honeypot operations, or similar investigative work leading to actionable insights.
  • Broad knowledge of multiple technology stacks and a strong curiosity to learn new platforms.
  • Deep experience with multiple major public clouds (AWS, Azure, or GCP), and familiarity with analyzing cloud‑native logs and telemetry.
  • Understanding of emerging attack techniques targeting AI infrastructure and machine learning pipelines (e.g., data poisoning, model theft, or prompt injection), and familiarity with frameworks such as MITRE ATLAS.
  • Proven history of thought leadership through blogs, LinkedIn articles, or conference presentations.
  • Background in the cybersecurity vendor space, with experience providing expert feedback to product and engineering teams.
  • Prior experience in customer-facing technical roles (consulting, remote support, or advisory).
  • Hands‑on familiarity with offensive security tools (Atomic Red Team, Sliver, Cobalt Strike, etc.).
  • Scripting or automation capability (Python, PowerShell, etc.).
  • Experience with Security Orchestration, Automation, and Response (SOAR) technology.
  • Recognized presence or active participation in the security community (e.g., X/Twitter, conferences, open source).
  • Experience applying AI or machine learning techniques to improve operational efficiency and automation across the detection rule development lifecycle — from research and validation to deployment and tuning.
Benefits
  • health insurance
  • retirement plans
  • flexible work arrangements
  • professional development
  • bonuses
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
threat researchmalware analysisinfrastructure trackinghoneypot operationsdetection logicincident responsescriptingautomationAI techniquesmachine learning
Soft Skills
collaborationthought leadershipcommunicationcuriosityfeedback provisioncustomer-facinginnovationresearch-driventechnical depthprioritization