Acronis logo

Senior Security Engineer - Elastic Siem And Detection Engineering

AcronisMA, , MA

$123,000 - $180,000 / year

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Overview

Schedule
Full-time
Career level
Senior-level
Remote
On-site
Compensation
$123,000-$180,000/year
Benefits
Health Insurance
Dental Insurance
Vision Insurance

Job Description

Acronis is a global leader in cyber protection, delivering AI-powered protection for productive MSPs in a single, natively integrated platform that unifies operations management, cybersecurity, and data protection. Driven by our mission to protect, manage and automate every workload that businesses and lives depend on, we've built the industry's only all-in-one solution.

We're looking for a Senior Security Engineer to lead our Elastic SIEM and Detection Engineering program. This is an engineering-first role focused on building scalable detection pipelines, improving telemetry quality, and developing high-confidence detections that help security teams move faster and respond more effectively.

You'll own the evolution of our Elastic Security environment - from log ingestion and platform optimization to Detection-as-Code pipelines and detection coverage strategy. This role is ideal for someone who enjoys building systems, improving signal quality, automating workflows, and solving detection engineering problems at scale.

While the primary focus is engineering, you'll also serve as a Tier 2 escalation point for complex security events, helping scope incidents, initiate containment when needed, and improve detections based on real-world activity.

This is a high-impact role with significant ownership and the opportunity to shape how detection engineering is implemented across the organization.

WHAT YOU'LL DO

Elastic SIEM & Platform Engineering:

  • Own and optimize the Elastic Security platform (Elasticsearch, Kibana, Fleet, Logstash, Elastic Agents)

  • Design and maintain ingestion pipelines for cloud, endpoint, network, and application telemetry

  • Improve telemetry quality, data retention, performance, and investigation workflows

  • Integrate SIEM workflows with SOAR and automation tooling

Detection Engineering & Detection-as-Code:

  • Build and maintain a Detection-as-Code pipeline using Git-based workflows and CI/CD automation

  • Develop, test, tune, and maintain high-fidelity detections using Elastic Security, EQL, and KQL

  • Reduce alert noise through tuning, enrichment, suppression, and exception handling

  • Map detections to MITRE ATT&CK and help drive detection coverage strategy

  • Track detection quality metrics including alert fidelity, false positive rates, and coverage gaps

Incident Response Support:

  • Assist with complex alert escalations and perform initial incident scoping

  • Execute initial containment actions when necessary (endpoint isolation, IP/domain blocking, account suspension)

  • Participate in a low-frequency on-call rotation for critical incidents

  • Translate incident learnings into improved detections and telemetry coverage

Collaboration & Automation:

  • Partner with infrastructure, DevSecOps, and cloud teams to improve logging and visibility

  • Build automation and tooling using Python and/or PowerShell

  • Support purple team exercises and adversary simulations

WHO WE'RE LOOKING FOR

  • 5+ years of cybersecurity engineering experience

  • 3+ years focused on SIEM engineering, detection engineering, or security analytics

  • Strong hands-on experience with Elastic Security and the Elastic Stack

  • Experience building or maintaining Detection-as-Code workflows using Git and CI/CD pipelines

  • Strong understanding of detection tuning, alert fidelity, and operational detection quality

  • Ability to independently investigate complex alerts and produce actionable findings

Technical Experience:

  • Elastic Security, Kibana, Fleet, Elastic Agents, EQL/KQL

  • Detection engineering and MITRE ATT&CK mapping

  • Jenkins, Bitbucket Pipelines, GitHub Actions, or similar CI/CD tooling

  • Python and/or PowerShell scripting

  • AWS CloudTrail, VPC Flow Logs, Azure Monitor, or similar telemetry sources

  • TCP/IP, DNS, HTTP/S, and common attack patterns

  • Threat intelligence enrichment and operationalization

Nice to Have:

  • SOAR playbook development and automated response workflows

  • Sigma rule development

  • Elastic detection-rules ecosystem familiarity

  • Terraform or Ansible experience

  • Previous SOC or Incident Response background

What Success Looks Like:

  • 30 Days: Validate telemetry sources and establish initial detection coverage baseline

  • 90 Days: Operational Detection-as-Code pipeline with initial custom detections deployed

  • 180 Days: Reduced alert noise, improved coverage visibility, and stabilized SIEM operations

WHO WE ARE

A Swiss company founded in Singapore in 2003, Acronis offers over twenty years of innovation with 15 offices worldwide and more than 1800 employees in 50+ countries. Acronis Cyber Protect is available in 26 languages in 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses.

Our corporate culture centers on innovation, accountability, and impact. We encourage our people to think boldly, challenge conventional approaches, and take ownership of outcomes. As a member of our global "A-Team," you'll operate in a high-growth, fast-paced environment where resilience, adaptability, and a commitment to continuous improvement drive success.

The US pay range for this position is $123,000-$180,000. This range reflects the minimum and maximum total target annual compensation for this role across all U.S. locations. The actual compensation offered at the start of employment is determined based on factors including, but not limited to, experience level, knowledge, skills, and geographic location.

In addition to competitive compensation, this role includes a comprehensive benefits package featuring medical, dental, and vision coverage, flexible spending accounts (FSA), disability and life insurance, a 401(k) retirement plan with company match, and a generous vacation policy.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall

FAQs About Senior Security Engineer - Elastic Siem And Detection Engineering Jobs at Acronis

What is the work location for this position at Acronis?
This job at Acronis is located in MA, , MA, according to the details provided by the employer. Some roles may also include multiple work locations depending on the requirement.
What pay range can candidates expect for this role at Acronis?
Candidates can expect a pay range of $123,000 and $180,000 per year.
What employment applies to this position at Acronis?
Acronis lists this role as a Full-time position.
What experience level is required for this role at Acronis?
Acronis is looking for a candidate with "Senior-level" experience level.
What benefits are offered by Acronis for this role?
Acronis offers following benefits: Health Insurance, Dental Insurance, Vision Insurance, Disability Insurance, Life Insurance, Paid Vacation, and 401k Matching/Retirement Savings for this position. Actual benefits may vary depending on the employer's policies and employment terms.
What is the process to apply for this position at Acronis?
You can apply for this role at Acronis either through Sonara's automated application system, which helps you submit applications 10X faster with minimal effort, or by applying manually using the direct link on the job page.