Cribl is seeking a Senior Manager, Security & Compliance to lead and manage the strategy, development, and optimization of our global security detection and response capabilities. In this role, you will architect high-fidelity, scalable detection logic across cloud-based and corporate infrastructure to proactively identify and disrupt sophisticated threats.
What You'll Do
- Define the vision, strategy, and roadmap for the security detection program, ensuring alignment with the company’s risk posture and business objectives.
- Oversee the development, testing, deployment, and continuous maintenance of all detection logic across SIEM, EDR, and other security platforms.
- Lead, mentor, and grow a high-performing team of security operators, engineers, and threat hunters.
- Translate emerging threat data and intelligence into actionable, automated, and preventative detection controls.
- Drive the architecture and continuous tuning of security monitoring and detection platforms for coverage, performance, and cost-effectiveness.
- Establish and formalize a proactive threat hunting capability to identify threats that evade existing security controls.
- Ensure detection and monitoring operations are compliant with global standards and regulations, such as SOC 2, ISO 27001, GDPR, and FedRAMP.
- Partner with internal engineering teams to integrate detection controls directly into cloud infrastructure and corporate environments.
- Serve as a key point of contact to provide executive leadership with a clear view of the company's detection coverage and maturity.
- Occasionally perform duties outside standard working hours due to time-zone differences.
What We're Looking For
- 10+ years of experience in cybersecurity, with a dedicated focus on building and scaling advanced security detection and threat hunting programs.
- Proven experience in a leadership role, building and managing Detections Engineering or Threat Hunting teams.
- Deep expertise in detection engineering principles, adversary tactics (e.g., MITRE ATT&CK), and advanced log source analysis.
- Expert-level knowledge of SIEM architecture (e.g., Splunk, Elastic, Sentinel), EDR technologies, and cloud-native detection tools (AWS GuardDuty, GCP Security Command Center, Azure Security Center).
- Proficiency in scripting or coding (e.g., Python, KQL, SPL) for detection rule development and automation.
- Strong understanding of cloud security architecture (AWS, GCP, Azure) and developing detections for cloud-native threats.
- Excellent communication and presentation skills, with the ability to convey complex detection strategies to technical and executive audiences.
Nice to Have
- Relevant industry certifications (e.g., GIAC GDSA, GCFA, CISSP) are a plus.
Technical Stack
- SIEM, EDR
- AWS GuardDuty, GCP Security Command Center, Azure Security Center
- Python, KQL, SPL
- AWS, GCP, Azure
Team & Environment
Lead and manage a team of security operators, engineers, and threat hunters.
Benefits & Compensation
- Compensation: $162,000 - $253,000
- Health, dental, and vision insurance
- Short-term disability and life insurance
- Paid holidays and paid time off
- Fertility treatment benefit
- 401(k) and equity
- Eligibility for a discretionary company-wide bonus
Work Mode
This is a remote-first position.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.




