Pillar A: CybersecurityA11

Detection Engineering & Threat Hunting

SIGMA/YARA/Suricata rule writing, hypothesis-driven hunting, log deep-dives, detection gap analysis.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Detection Engineering & Threat Hunting.

What is Detection Engineering & Threat Hunting?

Detection engineering is the discipline of designing, building, testing, and maintaining high-fidelity detections that reliably identify adversary behaviors in production environments. Unlike traditional signature-based approaches, modern detection engineering treats detections as code — version-controlled, peer-reviewed, tested against known attack simulations, and continuously refined based on false positive and false negative rates.

The field revolves around open standards like SIGMA (vendor-agnostic detection rules for log data), YARA (pattern matching for malware and file analysis), and Suricata rules (network-level intrusion detection). Detection engineers map their coverage to the MITRE ATT&CK framework, identify gaps in technique coverage, and prioritize new detections based on threat intelligence about active adversary campaigns.

Threat hunting complements detection engineering by proactively searching for adversary activity that existing detections missed. Hypothesis-driven hunting uses structured hypotheses about adversary behavior, tests them against collected telemetry, and converts validated findings into new automated detections — creating a continuous improvement cycle between reactive detection and proactive hunting.

Why it matters

Attackers constantly evolve their techniques to evade detection. Detection engineering ensures that defensive capabilities evolve at the same pace, turning threat intelligence into automated, testable, and measurable detection logic.

Detection engineering bridges the gap between threat intelligence and security operations. It translates knowledge about adversary behavior into the automated detection logic that SOC analysts rely on to identify real attacks.

Key topics

SIGMA rule writing and management
YARA rule development for malware detection
Suricata and Snort IDS/IPS rule creation
Detection-as-code pipelines and CI/CD
MITRE ATT&CK coverage mapping
Hypothesis-driven threat hunting
Data source identification and log gap analysis
Detection testing with atomic red team and CALDERA
False positive tuning and detection quality metrics
Threat-informed detection prioritization

People shaping this field

Researchers and practitioners worth following in this space.

Creator of the Pyramid of Pain detection model

Creator of SIGMA and YARA rule collections

Threat hunter and creator of HELK/Mordor datasets

Curated resources

Authoritative sources we ground Detection Engineering & Threat Hunting questions in — frameworks, research, guides, and tools.

VirusTotaltool

YARA — The Pattern-Matching Swiss Army Knife

Rule language for identifying malware families by binary patterns and metadata. Foundational for both detection engineering and malware classification.

MITRE Engenuitytool

MITRE Engenuity ATT&CK Evaluations

Independent evaluations of security products against real-world attack scenarios. Good for questions about detection coverage, visibility gaps, and evaluation methodology.

Mandiant (Google Cloud)guide

Mandiant M-Trends Report

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Lockheed Martinguide

Lockheed Martin Cyber Kill Chain

Seven phases from Reconnaissance to Actions on Objectives. Widely adopted but also widely critiqued (assumes perimeter-centric model). Good for compare/contrast with ATT&CK and Unified Kill Chain.

Palantirguide

Palantir — Alerting and Detection Strategy Framework

Open-source detection engineering methodology. Goal, categorization, strategy abstract, technical context, blind spots. Well-regarded community resource despite vendor origin.

SigmaHQtool

Sigma Rules

Generic signature format for SIEM detection rules. Platform-agnostic detection logic. Questions on detection rule writing, tuning, and false positive management.

Independentguide

David Bianco — Pyramid of Pain

Indicator hierarchy from hash values (trivial) to TTPs (tough). Foundational concept for detection engineering and threat intelligence questions.

VirusTotaltool

YARA Rules Documentation

Pattern matching tool for malware researchers. Create rules to identify and classify malware based on textual or binary patterns.

Communityguide

Detection Engineering Weekly

Curated newsletter covering detection engineering practices, tools, and techniques. Practical resource for SOC and detection teams.

Roles where this matters

Career paths where this domain shows up as core or recommended.

🛡SOC AnalystCore

Monitor, detect, and respond to security threats in a Security Operations Center. The front line of cyber defense.

🔎Threat Intelligence AnalystRecommended

Analyze adversary behavior, track threat actors, and produce actionable intelligence that drives defensive decisions.

🚨Incident Responder / DFIRCore

Investigate breaches, contain threats, and perform digital forensics. The first call when an attack is discovered.

📡Detection EngineerCore

Build detection rules, tune SIEM systems, and hunt for threats that evade automated defenses.

Cloud Detection / SecOps EngineerCore

A hybrid role growing out of the realisation that SOCs need engineers who understand cloud-native telemetry, IAM-first threat models, and how to instrument AWS/Azure/GCP for detection.

🧬Malware Reverse EngineerCore

Dissect malicious software to understand capabilities, extract indicators, and produce attribution. A specialist role that powers threat intelligence, detection engineering, and advanced IR.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

AWS Security SpecialtyProfessional·Amazon Web ServicesOfficial page →

AWS Certified Security — Specialty (SCS-C02)

Deep AWS security: IAM, data protection, detection, incident response within AWS primitives.

AZ-500Associate·MicrosoftOfficial page →

Microsoft Certified: Azure Security Engineer Associate

Azure-native security engineering: Entra ID, network controls, Defender, Sentinel.

BTL1Professional·Security Blue TeamOfficial page →

Security Blue Team Level 1

The BTL1 is one of the most practical entry-level certifications in the defensive area of cybersecurity. The exam is a complete 24-hour incident response scenario in a real lab environment – not a multiple-choice test. For career changers and entry-level professionals, it is a credible proof of competency that offers employers more meaningful value than many purely knowledge-based certificates. The course covers phishing analysis, SIEM, digital forensics, threat intelligence, and incident response. The certificate never expires, making it attractive long-term.

BTL2Professional·Security Blue TeamOfficial page →

Security Blue Team Level 2

Security Blue Team Level 2

CCDProfessional·CyberDefendersOfficial page →

Certified CyberDefender

Certified CyberDefender

CCOAProfessional·ISACAOfficial page →

Certified Cybersecurity Operations Analyst

ISACA certification for SOC analysts with hybrid exam of multiple choice and performance-based questions. Focus on incident detection, response, and threat analysis. New since 2024.

Cisco COPProfessional·CiscoOfficial page →

Cisco Certified CyberOps Professional

Cisco Certified CyberOps Professional

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

CrowdStrike CCFAAssociate·CrowdStrikeOfficial page →

CrowdStrike Certified Falcon Administrator

Day-to-day administration of the market-leading EDR platform — sensor deployment, policy authoring, and detection triage in Falcon.

CSAProfessional·EC-CouncilOfficial page →

EC Council Certified SOC Analyst

EC Council Certified SOC Analyst

CSX-PProfessional·ISACAOfficial page →

ISACA Cybersecurity Practitioner

ISACA Cybersecurity Practitioner

CTIAProfessional·EC-CouncilOfficial page →

EC Council Certified Threat intelligence Analyst

EC Council Certified Threat Intelligence Analyst

CySA+Associate·CompTIAOfficial page →

CompTIA Cybersecurity Analyst+

SOC analyst skills: triage, log analysis, vulnerability management basics.

Elastic EngineerProfessional·ElasticOfficial page →

Elastic Certified Engineer

Stands up and operates Elastic Stack clusters — search, observability, and security-analytics workloads on a real cluster.

FCP SOProfessional·FortinetOfficial page →

Fortinet Certified Professional - Security Operations

Fortinet Certified Professional - Security Operations

FCSS SOProfessional·FortinetOfficial page →

Fortinet Certified Solution Specialist - Security Operations

Fortinet Certified Solution Specialist - Security Operations

GCDAProfessional·GIACOfficial page →

GIAC Certified Detection Analyst

GIAC Certified Detection Analyst

GCEDProfessional·GIACOfficial page →

GIAC Certified Enterprise Defender

GIAC Certified Enterprise Defender

GCIAProfessional·GIAC / SANSOfficial page →

GIAC Certified Intrusion Analyst

Packet and log analysis, detection engineering fundamentals.

GCTDProfessional·GIACOfficial page →

GIAC Cloud Threat Detection

GIAC Cloud Threat Detection

GCTIProfessional·GIAC / SANSOfficial page →

GIAC Cyber Threat Intelligence

Structured threat intel production, ATT&CK, analytic tradecraft.

GDATExpert·GIACOfficial page →

GIAC Defending Advanced Threats

GIAC Defending Advanced Threats

GMONProfessional·GIACOfficial page →

GIAC Continuous Monitoring

GIAC Continuous Monitoring

GNFAProfessional·GIACOfficial page →

GIAC Network Forensic Analyst

GIAC Network Forensic Analyst

GREMExpert·GIAC / SANSOfficial page →

GIAC Reverse Engineering Malware

Static + dynamic malware analysis, unpacking, custom RE tooling.

GSEExpert·GIACOfficial page →

GIAC Security Expert

The GIAC Security Expert (GSE) is the highest distinction in the GIAC certification system and was fundamentally reformed in 2023/2024: Instead of a single exam, it is now awarded as a portfolio certification. Those who demonstrate six Practitioner and four Applied Knowledge certifications (hands-on, proctored lab exams) automatically receive GSE status. The model enforces genuine breadth and depth – which increases credibility compared to earlier pure knowledge tests. However, the effort (cost, time, multiple exams) is considerable; the GSE is therefore clearly aimed at experienced experts pursuing SANS/GIAC as a career path. In Europe, awareness outside the SANS community is still limited.

GSOCProfessional·GIAC / SANSOfficial page →

GIAC Security Operations Certified

SOC operations, alert triage, metrics, SOAR.

HTB CDSAProfessional·Hack The BoxOfficial page →

Hack the Box Certified Defensive Security Analyst

Hack the Box Certified Defensive Security Analyst

MAD FundamentalsAssociate·MITRE EngenuityOfficial page →

MITRE ATT&CK Defender — ATT&CK Fundamentals

Introductory course to the MITRE ATT&CK framework. Mandatory prerequisite for all advanced MAD20 tracks. 18 lectures, 1 hands-on lab, 1 range scenario. Covers fundamentals of ATT&CK: tactics, techniques, groups, software and mitigations. Badge upon completion (2 CPE hours).

MAD Purple TeamingProfessional·MITRE EngenuityOfficial page →

MITRE ATT&CK Defender — Purple Teaming

MAD20 track for Purple Teaming with ATT&CK methodology. 32 lectures, planning and execution walkthroughs. Covers coordination between red and blue teams using the ATT&CK framework. Badge upon completion (13 CPE hours).

MAD SOCAProfessional·MITRE EngenuityOfficial page →

MITRE ATT&CK Defender — SOC Assessment

MAD20 track for assessing SOC capabilities using the ATT&CK framework. 17 lectures, heatmap and defensive recommendation walkthroughs. Teaches methodology for systematic assessment of detection coverage. Not a traditional certificate, but a badge upon course completion (9 CPE hours).

MAD Threat HuntingProfessional·MITRE EngenuityOfficial page →

MITRE ATT&CK Defender — Threat Hunting and Detection Engineering

MAD20 track for Threat Hunting and Detection Engineering with ATT&CK. 28 lectures, complete analytics walkthroughs, 60+ range scenarios. Covers systematic development of detection rules and hunting hypotheses based on ATT&CK techniques. Badge upon completion (9 CPE hours).

OSDAProfessional·OffSecOfficial page →

Offensive Security Defense Analyst

Offensive Security Defense Analyst

PCDRAProfessional·Palo AltoOfficial page →

Palo Alto Networks Certified Detection and Remediation Analyst

Palo Alto Networks Certified Detection and Remediation Analyst

SC-200Associate·MicrosoftOfficial page →

Microsoft Certified: Security Operations Analyst Associate

The SC-200 is Microsoft's role-based certification for Security Operations – with clear focus on its own product ecosystem (Microsoft Sentinel, Defender XDR, Security Copilot). It is not a vendor-neutral SOC certificate, but specifically validates the ability to detect and respond to threats in Azure and M365 environments. For teams already heavily invested in Microsoft technologies, it is very practical and relevant to the job market. Outside this stack, it loses significant weight. The exam will be updated on April 16, 2026 – candidates should review the current Study Guide.

Splunk Core UserEntry·SplunkOfficial page →

Splunk Core Certified User

Foundational SPL fluency — search, filter, and report on Splunk data without breaking it.

Splunk ES AdminProfessional·SplunkOfficial page →

Splunk Enterprise Security Certified Admin

Operates and tunes Splunk Enterprise Security — content, correlation searches, notable events, and risk-based alerting.

Also touched

CCSPProfessional·ISC2Official page →

Certified Cloud Security Professional

Cloud security architecture: shared responsibility, identity, data protection, crypto, and cloud-native detection.

CRTEExpert·Altered SecurityOfficial page →

Certified Red Team Expert

Multi-forest AD compromise — cross-trust abuse, advanced delegation, and persistence in hardened enterprise environments.

CRTPProfessional·Altered SecurityOfficial page →

Certified Red Team Professional

Hands-on Active Directory attacker — Kerberos abuse, trust attacks, and lateral movement against a real multi-domain forest.

GCIHProfessional·GIAC / SANSOfficial page →

GIAC Certified Incident Handler

Incident handling methodology and lifecycle.

GCP Professional Cloud Security EngineerProfessional·Google CloudOfficial page →

Google Cloud Certified — Professional Cloud Security Engineer

GCP-specific security engineering: identity, VPC SC, secrets, logging, compliance.

GCSAProfessional·GIAC / SANSOfficial page →

GIAC Cloud Security Automation

Security-as-code: IaC hardening, CI/CD guardrails, automated cloud response.

Security+Entry·CompTIAOfficial page →

CompTIA Security+

Broad entry-level knowledge across threats, ops, IAM, network, and crypto basics.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

More in Cybersecurity

Test what you know about Detection Engineering & Threat Hunting

42 questions available. Beginner to expert questions, scored against the global leaderboard.