Cred

threat detection engineer

Cred bengaluru Today
engineering
what is CRED?
CRED is an exclusive community for India’s most trustworthy and creditworthy individuals, where the members are rewarded for good financial behavior. CRED was born out of a need to bring back the focus on a long lost virtue, one of trust, the idea being to create a community centered around this virtue. a community that constantly strives to become more virtuous in this regard till they finally scale their behavior to create a utopia where being trustworthy is the norm and not the exception.
to build a community like this requires a community of its own; a community special in its own way, working towards making this vision come true. 

here’s a thought experiment: what do you get when you put a group of incredibly passionate and driven people and entrust them with the complete freedom to chase down their goals in a completely uninhibited manner?
answer: you get something close to what we have at CRED; CRED just has it better. 

here’s what will be in store for you at CRED once you join as a part of the team 

what you will do ?

  • Work across a diverse information security domain, with a strong focus on threat detection, response, and security telemetry across infrastructure, cloud, and data
  • Identify and investigate security threats (internal and external), partner with stakeholders on remediation, and design preventive controls for recurring or systemic issues
  • Design, build, and continuously improve high-fidelity detection use cases across cloud, endpoint, identity, and network telemetry
  • Formulate new detection ideas based on adversary research, emerging attack techniques, industry incidents, and threat intelligence
  • Lead and participate in incident response, performing root-cause analysis and driving preventive improvements post-incident
  • develop and enhance the CRED’s detection, monitoring and response capabilities
  • Automate incident response workflows using playbooks and orchestration to reduce manual effort
  • build in-house security analytics solutions using open source tools (log parsing, event correlation and threat detection)research/conduct threat hunting operations using known adversary tactics, techniques and procedures to detect advanced threats
  • assist with creating security awareness and maintaining prudent security engineering culture within an organization
  • enable compliance in teams and help them achieve some of the industry’s best practices (e.g. PCI DSS, ISO 27001)
  • you should apply if you have:

  • 2 to 6 years of experience in information security with a strong focus on threat detection and response
  • Hands-on experience detecting and responding to threats across cloud (AWS preferred), endpoint (Windows/Linux/macOS), and network telemetry
  • Exposure to EDR, IDS/IPS, and SIEM / centralized logging platforms (Splunk, ELK, Sentinel, or similar), including building high-fidelity detection pipelines
  • Proficiency in at least one programming or scripting language (Python, Go, or Bash)Solid understanding of MITRE ATT&CK, Cyber Kill Chain, and Diamond Model
  • Ability to design and tune detection rules using MITRE ATT&CK and threat intelligence with a focus on signal quality
  • Experience with threat hunting, automation and enrichment, regex creation, and false-positive reduction
  • Experience handling the complete incident response lifecycle, from detection through remediation and reporting
  • Strong data-driven mindset with the ability to influence both technical and non-technical stakeholders
  • Ability to act as a go-to person, communicating clearly with engineering, product, and business teams
  • Proactive approach to staying current with security news, breach reports, tools, and attacker research
  • Strong learning agility and passion for exploring diverse security domains, demonstrated via GitHub, blogs, research, or talks
  • Exposure to the AI-driven threat landscape, digital forensics, or malware analysis is a strong plus
  • Note: This is an engineering-driven threat detection role. You will treat detection and response as software building and owning detection logic, enrichment pipelines, automation, and signal quality from end to end. This is not a traditional SOC role focused only on alert monitoring.

  • how is life at CRED?

    working at CRED would instantly make you realize one thing: you are working with the best talent around you. not just in the role you occupy, but everywhere you go. talk to someone around you; most likely you will be talking to a singer, standup comic, artist, writer, an athlete, maybe a magician. at CRED people always have talent up their sleeves. with the right company, even conversations can be rejuvenating. at CRED, we guarantee a good company.

    hard truths: pushing oneself comes with the role. and we realize pushing oneself is hard work. which is why CRED is in the continuous process of building an environment that helps the team rejuvenate oneself: included but not limited to a stacked, in-house pantry, with lunch and dinner provided for all the team members, paid sick leaves and a comprehensive health insurance. 

    to make things smoother and to make sure you spend time and energy only on the most important things,  CRED strives to make every process transparent: there are no work timings because we do not believe in archaic methods of calculating productivity, your work should speak for you. there are no job designations because you will be expected to hold down roles that cannot be described in one word.
    since trust is a major virtue in the community we have built, we make it a point to highlight it in the community behind CRED: all our employees get their salaries before their joining date. a show of trust that speaks volumes because of the skin in the game. 

    there are many more such eccentricities that make CRED what it is but that’s for one to discover. if you feel at home reading this, get in touch.

    Sponsored

    Explore Engineering

    Skills in this job

    People also search for