Threat Detection
The practice of designing, building, and maintaining detection logic that identifies threats in your environmentβturning threat intelligence into actionable alerts.
What is Detection Engineering?
Detection Engineering bridges the gap between knowing a threat exists and actually detecting it. It's the systematic process of translating adversary behaviours, TTPs, and indicators into detection rules that generate high-fidelity alerts.
ATT&CK technique
KQL / SPL / YARA rule
Triageable event
IOC feed
Correlation rule
Enriched alert
IR findings
Behavioural analytic
Investigation trigger
The goal: Detect real threats with minimal false positives, enabling analysts to focus on what matters.
Why It Matters
Without detection engineering, SOCs drown in vendor-default rules that generate noise without context. Effective detection engineering delivers:
Coverage β Mapped detection across MITRE ATT&CK tactics
Precision β Reduced false positives through environmental tuning
Context β Alerts enriched with investigative guidance
Resilience β Detections that survive adversary evasion
Measurability β Quantified detection gaps and coverage metrics
Core Responsibilities
Rule Development
Writing detection logic in KQL, SPL, Sigma, YARA, or Snort/Suricata syntax based on threat intelligence and attack patterns.
Tuning & Optimisation
Reducing false positives by understanding environmental baselines, excluding known-good activity, and refining thresholds.
Coverage Analysis
Mapping existing detections to MITRE ATT&CK, identifying gaps, and prioritising development based on threat relevance.
Validation & Testing
Using atomic tests, purple team exercises, and attack simulations to verify detections fire correctly.
Documentation
Maintaining detection metadata: intent, data sources, false positive guidance, and response procedures.
The Detection Lifecycle
Detection Types
Signature
Known-bad indicators
Hash, IP, domain blocklist
Behavioural
Suspicious activity patterns
LSASS access from unusual process
Anomaly
Deviation from baseline
First-time PowerShell execution by user
Correlation
Multiple events combined
Failed logins + successful auth + data access
Threshold
Volume-based triggers
>10 failed logins in 5 minutes
Best practice: Layer detection typesβsignatures catch known threats, behavioural catches novel attacks.
Key Frameworks & Tools
Detection Language
KQL, SPL, Sigma, YARA, Snort/Suricata
SIEM/XDR
Sentinel, Defender XDR, Splunk, Elastic
Testing
Atomic Red Team, MITRE Caldera, Stratus Red Team
Coverage Mapping
DeTT&CT, ATT&CK Navigator
Rule Repos
Sigma HQ, Elastic Detection Rules, Azure Sentinel
From SOC Analyst to Detection Engineer
Detection engineering is a natural progression for analysts who want to move from reactive alert handling to proactive defence.
Skills to develop:
Query languages β KQL, SPL, or your platform's syntax
Log source knowledge β Understanding what telemetry exists and what it captures
ATT&CK fluency β Mapping techniques to data sources and detection opportunities
Scripting β Python/PowerShell for automation and validation
Adversary mindset β Thinking like an attacker to anticipate evasion
{% hint style="info" %} Start here: Take alerts you've triaged, identify the detection logic behind them, and propose improvements based on false positive patterns or missed context. {% endhint %}
Measuring Success
MITRE coverage %
Gaps in detection capability
Mean time to detect (MTTD)
Speed of threat identification
False positive rate
Rule precision and tuning needs
Detection-to-incident ratio
Signal quality
Rule validation pass rate
Detection reliability
Quick Wins
Document FP patterns β Track why alerts are closed as false positives; feed back into tuning
Build a Sigma library β Platform-agnostic rules you can take anywhere
Map one tactic β Pick a MITRE tactic, audit coverage, build detections for gaps
Automate validation β Schedule atomic tests against your detection rules
Create runbooks β Pair every detection with analyst response guidance
Detection engineering transforms SOC operations from alert-driven chaos to intelligence-led defence.
Last updated