Job Details
Job Information
Other Information
Job Description
Weekly Hours: 40
Role Number: 200635093-3337
Summary
The people here at Apple don’t just craft products — they build the kind of wonder that revolutionizes entire industries. It’s the diversity of those people and their ideas that inspires the innovation that runs through everything we do, including our approach to security. Join Apple, and help us protect the services that billions of customers rely on every day.
The Detection team within Apple Services Engineering (ASE) is responsible for building advanced detections that protect approximately three-quarters of Apple’s systems and services. We achieve this by partnering closely with engineering teams to develop a deep technical understanding of how these systems operate, along with a comprehensive grasp of the threat landscape. This allows us to build state-of-the-art security detections that proactively defend against real-world attacks.
We’re looking for a Detection Creation Engineer who combines deep security intuition with technical implementation skills. In this role, you’ll craft detection logic that catches active malicious activity across Apple’s infrastructure. You’ll need to think like an attacker, understand how malicious behaviors manifest in telemetry data, and translate that knowledge into high-fidelity detections that protect our customers.
This is a hands-on technical role where you’ll write detection code in Scala Spark (Databricks notebooks) and configuration files for on-host detection systems (such as Falco rules). While we don’t require prior Scala experience, we do expect strong programming fundamentals and the curiosity to dive deep into new technologies.
If you’re passionate about understanding attacker tradecraft and translating that knowledge into defensive capabilities, we’d love to hear from you!
Description
As a Detection Creation Engineer on the ASE Detection Team, you will:
Develop security detections that identify active malicious activity across Apple’s services and infrastructure, implementing detection logic in Scala Spark (Databricks) and on-host detection frameworks (Falco rules)
Analyze attacker behaviors and translate them into observable patterns across diverse telemetry sources including system call events, network logs, database access logs, endpoint security telemetry, Kubernetes audit logs, and other security-relevant data sources
Collaborate with engineering teams to understand system architectures, identify detection opportunities, and develop detections that are both high-fidelity and operationally sustainable
Tune and optimize detections based on real-world alert data, reducing false positives while maintaining coverage of malicious behaviors
Operationalize detections by working with security operations teams to ensure alerts are actionable, triaged efficiently, and integrated into incident response workflows
Document detection logic and rationale to enable knowledge sharing across the security organization
Minimum Qualifications
5+ years of experience in security detection, threat hunting, incident response, penetration testing, red teaming, or related security disciplines
Demonstrated understanding of real attacker behaviors, tactics, and techniques
Proficiency in at least one programming language (Python, Scala, Java, Go, or similar) with the ability and willingness to learn Scala
Bachelor’s degree in Computer Science, Cybersecurity, Engineering, Information Systems, or related field, or equivalent professional experience
Experience analyzing security telemetry data to identify malicious activity or anomalous behaviors
Preferred Qualifications
Prior experience writing detections in Scala, Python, or other languages for large-scale data processing systems
Experience with Apache Spark, Databricks, or similar large-scale distributed compute frameworks
Hands-on experience with on-host detection rules engine systems (Falco or similar)
Deep technical expertise in one or more areas: Linux system internals, network protocols, web application security, container/Kubernetes security, or cloud infrastructure
Experience with multiple security-relevant telemetry sources: system call traces (network, process, file), endpoint detection and response (EDR) data, network traffic analysis, application logs, database audit logs, cloud provider audit logs
Understanding of evasion techniques and how attackers attempt to avoid detection
Contributions to open-source security projects or published research on detection techniques
Experience with detection engineering at scale, including managing false positive rates and detection tuning methodologies
Apple is an equal opportunity employer that is committed to inclusion and diversity. We seek to promote equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics. Learn more about your EEO rights as an applicant (https://www.eeoc.gov/sites/default/files/2023-06/22-088_EEOC_KnowYourRights6.12ScreenRdr.pdf) .
Other Details

