Careers

Supporting the innovators who will secure our future

Senior Threat Detection Engineer:

TENEX.AI

TENEX.AI

Kansas City, MO, USA
Posted on May 24, 2025

Location: Overland Park, Kansas

Position Type: Full-Time

About Tenex:

TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is comprised of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.

About the Role:

Tenex is seeking a highly motivated and skilled Senior Threat Detection Engineer to join our growing Security Operations team. In this critical role, you will be responsible for proactively identifying and mitigating security threats by developing and implementing advanced detection rules (YARA-L). You will work with our Security Operations team and leverage your deep understanding of attack methodologies, security vulnerabilities, and log analysis to enhance security posture and protect assets.

Responsibilities:

  • Design, develop, implement, and maintain custom detection rules, correlation searches, and alerts within Google Security Operations (SecOps) to identify malicious activity, security incidents, and policy violations.

  • Utilize your expertise in the SecOps detection engine and YARA-L syntax to create efficient and effective detection logic.

  • Analyze large datasets of security logs and events from various sources (e.g., cloud platforms, endpoint detection and response (EDR), network devices, applications) to identify patterns and anomalies indicative of threats.

  • Stay up-to-date with the latest threat intelligence, attack techniques, and security trends to proactively develop new detection strategies.

  • Collaborate closely with Security Analysts to tune detections logic based on incident analysis and threat landscape changes.

  • Contribute to the development and maintenance of security documentation, including YARA-L rules, response strategies, playbooks, and operational procedures.

  • Participate in the evaluation and integration of new security tools and technologies.

  • Automate detection creation, threat intelligence gathering, and rule deployment.

  • Provide mentorship, training, and guidance to junior team members.

Qualifications:

  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field (or equivalent practical experience).

  • Minimum of 5 years of experience in a security operations role, with a strong focus on threat detection and analysis.

  • Proven experience developing and implementing YARA-L rules within Google Security Operations (SecOps) is essential.

  • Experience with threat intelligence and its integration into detection strategies.

  • Deep understanding of security principles, common attack vectors, and threat actor tactics, techniques, and procedures (TTPs).

  • Strong analytical and problem-solving skills with the ability to analyze complex security logs and identify meaningful patterns.

  • Proficiency in scripting languages such as Python or similar for automation and analysis.

  • Experience working with various security technologies and data sources, including but not limited to:

    • Cloud security platforms (e.g., GCP, AWS, Azure)

    • Endpoint Detection and Response (EDR) solutions

    • Security Information and Event Management (SIEM) systems

    • Network security devices (firewalls, intrusion detection/prevention systems)

    • Identity and Access Management (IAM) systems

  • The ability to effectively communicate technical information to both technical and non-technical audiences.

  • Ability to work independently and as part of a team in a fast-paced environment.

Preferred Qualifications:

  • Relevant security certifications such as Security+, CySA+, GCIH, GCIA, or similar.

  • Familiarity with MITRE ATT&CK framework and its application in developing detection rules.

  • Experience with SOAR (Security Orchestration, Automation and Response) platforms.

  • Knowledge of data science and machine learning concepts as applied to security analytics.

Why Join Us?

  • Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.

  • Collaborate with a talented and innovative team focused on continuously improving security operations.

  • Competitive salary and benefits package.

  • A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.