Docusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
Docusign is seeking a skilled and motivated Detection Engineer to join our Threat Detection Engineering team. Reporting to the Manager of Threat Detection Engineering, you will be a key contributor in developing and implementing Docusign's threat detection capabilities. This role is focused on creating threat-driven detections, leveraging Detection-as-Code principles, and actively participating in the design, ownership, and support of the underlying data pipeline and SIEM platform. You will work to ensure robust protection across our cloud, on-premise, and endpoint environments, contributing to scalable, effective, and automated detection and response solutions that anticipate and mitigate sophisticated cyber threats. This role requires a strong technical foundation, an engineering-focused mindset, the ability to be on-call, and a passion for building and maintaining the critical infrastructure that powers our detection efforts.
This position is an individual contributor role reporting to the Senior Director, Detect and Respond.
Responsibility
Participate actively in the design, ownership, and support of the security data pipeline and SIEM platform. This involves working with data collection, ingestion, processing, and storage of security telemetry. You will contribute to optimizing the platform for performance, scalability, and reliability to support all threat detection needs
Design, develop, and implement high-fidelity threat detections based on threat intelligence, attacker TTPs, and analysis of security telemetry. Focus on creating detections that are effective, accurate, and minimize false positives
Embrace and implement Detection-as-Code principles throughout the detection lifecycle. This includes using version control, automated testing, and continuous integration/continuous deployment (CI/CD) pipelines for detections to ensure consistency, reliability, and scalability
Collaborate with the Incident Response team to translate threat intelligence into actionable detections with automated response workflows. Participate in post-incident reviews to drive continuous improvement in detection capabilities
Contribute to the adoption and integration of new detection technologies, frameworks, and processes. Help architect and maintain scalable, automated security discovery and containment systems leveraging modern data platforms, EDR, network traffic analysis tools, and cloud-native security solutions
Partner effectively with engineering, product, and other security teams to ensure comprehensive coverage, address blind spots, and instill security monitoring best practices throughout the software development lifecycle
Contribute to establishing and authoring repeatable and scalable processes around detection and automation engineering. Define and track key performance indicators to measure the effectiveness of detection capabilities
Communicate technical security concepts, findings, and recommendations to both technical and non-technical stakeholders
Remote: Employee is not required to be in or near an office frequently and works from a designated remote work location for the majority of the time.
Hybrid: Employee divides their time between in-office and remote work. Access to an office location is required. (Frequency: Minimum 2 days per week; may vary by team but will be weekly in-office expectation)
In Office: Employee works from the physical workspace 100% of the time.
Positions at Docusign are assigned a job designation of either In Office, Hybrid or Remote and are specific to the role/job. Preferred job designations are not guaranteed when changing positions within Docusign. Docusign reserves the right to change a position's job designation depending on business needs and as permitted by local law.
Basic
5+ years of progressive experience in cybersecurity, with at least 2+ years in a dedicated threat detection engineering role
Experience in developing threat detections at scale in cloud-inclusive environments (e.g., AWS, Azure, GCP)
Experience with the design, implementation, and support of security data pipelines and SIEM platforms
Experience with data pipeline technologies and architectures, including data extraction, transformation, loading, processing, and storage for security data, with hands-on experience managing and optimizing these systems
Experience with the cyber threat landscape, attacker tactics, techniques, and procedures (TTPs), and frameworks such as MITRE ATT&CK.
Expertise in detection rule languages (e.g., SPL, KQL) and advanced query development, with an understanding of the underlying data structures and query optimization
Experience writing detections based on diverse security signals and telemetry (e.g., network traffic, endpoint logs, cloud logs), with an engineering approach to signal processing and analysis
Experience with security tools and technologies such as SIEM/SOAR platforms (e.g., Splunk, Sentinel), EDR, IDS/IPS, network traffic analysis tools (e.g., Zeek, Suricata, Yara), and cloud security solutions, with an understanding of their architecture and integration
Experience with scripting/programming (e.g., Python, Go, Bash, PowerShell) for security tooling, automation, and API integrations, with a focus on writing clean, maintainable, and efficient code
Experience analyzing and interpreting large datasets and logs to identify security risks and events, applying data engineering and analysis techniques.
Experience with CI/CD pipelines and Detection-as-Code practices, including version control, testing, and automated deployment of detections
Preferred
Strong analytical and problem-solving skills, with meticulous attention to detail and an engineering approach to root cause analysis
Proven ability to collaborate effectively across cross-functional teams
Passion for continuous learning, operational excellence, and a proactive, adversarial mindset, with a commitment to improving engineering processes and outcomes
Bachelor's degree or equivalent experience in Computer Science, Cybersecurity, or a related field; advanced degree or security certifications (e.g., GIAC, CISSP) are a plus
Experience with anomaly detection, machine learning, and statistical analysis of user behavior patterns for security purposes
Background in security-focused software engineering or offensive security
History of speaking at security conferences or publishing research
Understanding of AI and Machine Learning applications in threat detection and security, including the ability to evaluate, implement, and manage AI-based detection solutions and secure AI/ML systems
Pay for this position is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience.
Based on applicable legislation, the below details pay ranges in the following locations:
California: $X/hour - $X/hour or $X - $X base salary
Illinois, Colorado, Massachusetts and Minnesota: $X/hour - $X/hour or $X - $X base salary
Washington, Maryland, New Jersey and New York (including NYC metro area): $X/hour - $X/hour or $X - $X base salary
Washington DC: $X/hour - $X/hour or $X - $X base salary
Ohio: $X/hour - $X/hour or $X - $X base salary
This role is also eligible for the following:
Global benefits provide options for the following:
Work Authorization Notice: Please note that we do not provide visa sponsorship or immigration support for this position. Applicants must already be authorized to work in the United States on a full-time, permanent basis without the need for current or future sponsorship.
Working here
Docusign is committed to building trust and making the world more agreeable for our employees, customers and the communities in which we live and work. You can count on us to listen, be honest, and try our best to do what’s right, every day. At Docusign, everything is equal.
We each have a responsibility to ensure every team member has an equal opportunity to succeed, to be heard, to exchange ideas openly, to build lasting relationships, and to do the work of their life. Best of all, you will be able to feel deep pride in the work you do, because your contribution helps us make the world better than we found it. And for that, you’ll be loved by us, our customers, and the world in which we live.
Accommodation
Docusign is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. If you need such an accommodation, or a religious accommodation, during the application process, please contact us at accommodations@docusign.com.
If you experience any issues, concerns, or technical difficulties during the application process please get in touch with our Talent organization at taops@docusign.com for assistance.
This position is not eligible for employment in the following states: Alaska, Hawaii, Maine, Mississippi, North Dakota, South Dakota, Vermont, West Virginia and Wyoming.
It's important to us that we build a talented team that is as diverse as our customers and where all employees feel a deep sense of belonging and thrive. We encourage great talent who bring a range of perspectives to apply for our open positions. Docusign is an Equal Opportunity Employer and makes hiring decisions based on experience, skill, aptitude and a can-do approach. We will not discriminate based on race, ethnicity, color, age, sex, religion, national origin, ancestry, pregnancy, sexual orientation, gender identity, gender expression, genetic information, physical or mental disability, registered domestic partner status, caregiver status, marital status, veteran or military status, or any other legally protected category.
Software Powered by iCIMS
www.icims.com