Senior Logging & Detection Engineer
Remote logging supervisor job
Clio is the global leader in legal AI technology, empowering legal professionals and law firms of every size to work smarter, faster, and more securely. We are transforming the legal experience for all by bettering the lives of legal professionals while increasing access to justice.
Summary:
We are currently seeking a Senior Logging & Detection Engineer to lead the technical direction within our rapidly growing Security team and our new Logging Engineering team. This role is for a seasoned professional passionate about building sophisticated, scalable detection architectures, mastering efficient queries at petabyte scale, and driving strategic security analytics through log data. You will own the detection and analysis layer of our logging platform, serving as the domain expert who makes a tangible, high-impact difference to our security monitoring capabilities.
This role is available to candidates across Canada (excluding Quebec). If you are local to one of our hubs (Burnaby, Calgary, or Toronto) you will be expected to be in office minimum two days per week for our Anchor Days.
What your team does:
Are you someone who's always probing and asking why at an architectural level, someone who enjoys finding system-wide patterns in data and designing smarter, fault-tolerant detection logic? If so, we have a strategic spot for you on Clio's new Logging Engineering team! We are looking for the right candidate to develop, optimize, and serve as the technical lead for our security detection capabilities, and be the technical expert in query optimization and analytics. If you have a deep background in security analytics and senior level experience in platform-level log analysis and detection engineering, then we want to talk to you.
What you'll work on:
* Lead the design and implementation of sophisticated, production-ready detection rules and queries across the ELK stack, security data lakes, and multi-cloud logging platforms.
* Architect and optimize complex search queries, aggregations, and analytics dashboards for high-velocity security monitoring, focusing on performance and cost efficiency.
* Design and build automated detection and response workflows (SOAR), ensuring seamless and reliable integration with critical incident response systems.
* Serve as the primary liaison with the threat intelligence team, developing and owning the framework to translate intelligence into scalable, actionable detection capabilities (e.g., MITRE ATT&CK coverage).
* Establish and maintain a robust detection rule library, query templates, and lead the creation of security analytics playbooks for the wider team.
* Drive performance optimization and resource utilization strategies across petabyte-scale log datasets, including index design and data tiering.
* Develop and standardize custom visualizations, dashboards, and executive reporting capabilities for security stakeholders.
* Lead complex threat hunting operations, mentor junior team members on investigative techniques, and proactively refine detection logic to achieve near-zero false positive rates.
* Collaborate closely with the platform team to define the logging architecture roadmap based on future detection requirements and security observability goals.
* Proactively research emerging threats and attack patterns, translating novel techniques into strategic, forward-looking detection logic and advising security leadership.
What you bring:
* Senior-level expertise building and scaling enterprise-grade detection capabilities and security monitoring systems.
* Expert-level query language proficiency in at least two of the following: Elasticsearch/Lucene, SQL, KQL (Kusto), or SPL (Splunk), demonstrating advanced optimization techniques.
* Extensive Detection Engineering experience owning the full lifecycle of rules, alerts, and automated response workflows within a SIEM/SOAR environment.
* Advanced log analysis skills across diverse, large-scale data sources, including multi-cloud logs (AWS, Azure, GCP), network flows, and advanced security tool outputs.
* Deep dashboard and visualization expertise with tools like Kibana, Grafana, or Tableau, specifically for security metrics and executive reporting.
* Proven expertise in leading threat hunting efforts using log data to proactively identify and track sophisticated threats and anomalous behavior across the environment.
* Senior-level scripting and automation abilities (Python/Go/PowerShell), used to build custom tools, manage APIs, and drive detection automation at scale.
* Architectural experience integrating and optimizing SIEM platforms, SOAR tools, and security orchestration systems.
* Expert performance optimization skills covering query tuning, index design, data partitioning, and overall resource-efficient analytics on big data.
* Significant incident response experience providing expert-level technical analysis and forensic support during major security incidents.
Nice to have:
* Strategic experience with advanced analytics, machine learning, or statistical modeling for security, such as User and Entity Behavior Analytics (UEBA) or predictive threat modeling.
* Multi-platform security architecture experience across major cloud environments (AWS CloudTrail, Azure Activity Logs, GCP Audit Logs).
* Deep, practical experience building custom detection content mapped directly to the MITRE ATT&CK framework, including coverage gap analysis.
* Industry-recognized security certifications such as GCTI, GCFA, GNFA, or CISSP.
* Track record of open source contributions to detection rule repositories, security analytics tools, or SIEM content.
* Data science or advanced mathematics background with direct experience in anomaly detection, clustering, or predictive analytics for security.
* Expert API integration skills for automated, real-time threat intelligence ingestion and centralized detection rule management.
* Cloud security analytics mastery utilizing cloud-native security services (e.g., Security Hub, Defender for Cloud) and serverless detection architectures.
* Compliance and reporting leadership experience building analytics and dashboards for regulatory requirements (e.g., SOC 2, ISO 27001) and defining key security metrics.
This is a new role.
What you will find here:
Compensation is one of the main components of Clio's Total Rewards Program. We have developed a series of programs and processes to ensure we are creating fair and competitive pay practices that form the foundation of our human and high-performing culture.
Some highlights of our Total Rewards program include:
* Competitive, equitable salary with top-tier health benefits, dental, and vision insurance
* Hybrid work environment, with expectation for local Clions (Vancouver, Calgary, Toronto, Dublin and Sydney) to be in office min. twice per week.
* Flexible time off policy, with an encouraged 20 days off per year.
* $2000 annual counseling benefit
* RRSP matching and RESP contribution
* Clioversary recognition program with special acknowledgement at 3, 5, 7, and 10 years
The expected salary range* for this role is $146,200 to $172,000 to $197,800 CAD. There are a separate set of salary bands for other regions based on local currency.
* Our salary bands are designed to reflect the range of skills and experience needed for the position and to allow room for growth at Clio. For experienced individuals, we typically hire at or around the midpoint of the band. The top portion of the salary band is reserved for employees who demonstrate sustained high performance and impact at Clio. Those who are new to the role may join below the midpoint and develop their skills over time. The final offer amount for this role will be dependent on geographical region, applicable experience, and skillset of the candidate.
Diversity, Inclusion, Belonging and Equity (DIBE) & Accessibility
Our team shows up as their authentic selves, and are united by our mission. We are dedicated to diversity, equity and inclusion. We pride ourselves in building and fostering an environment where our teams feel included, valued, and enabled to do the best work of their careers, wherever they choose to log in from. We believe that different perspectives, skills, backgrounds, and experiences result in higher-performing teams and better innovation. We are committed to equal employment and we encourage candidates from all backgrounds to apply.
Clio provides accessibility accommodations during the recruitment process. Should you require any accommodation, please let us know and we will work with you to meet your needs.
Learn more about our culture at clio.com/careers
We're a Human and High Performing AI company, meaning we use artificial intelligence to improve all of our operations. In recruitment, AI helps us streamline the process for greater efficiency. However, we've built our systems to ensure that a human always reviews AI-generated output, and we never make automated hiring decisions.
Disclaimer: We only communicate with candidates through ****************** email addresses.
Auto-ApplyBackend Engineer III, LogScale Language and Runtime (Remote, East Coast)
Remote logging supervisor job
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. We work on large scale distributed systems, processing almost 3 trillion events per day and this traffic is growing daily. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About the Role:
CrowdStrike is seeking an experienced Engineer III for our NG-SIEM Product Group to work on the LogScale platform. As a member of the LogScale Language & Runtime team you will focus on the LogScale query language and its execution pipeline, from extending the query language to improving performance of existing functions. This is a highly distributed system that ingests 10+ Petabytes of data per day. Our goals are to scale to 100s of PB of data ingress per day, while maintaining best-in-class ingest, search and detection SLAs, as well as best-in-class cost structure. You will be joining a distributed team of highly collaborative engineers who share a strong passion for the product. In this role you will get a chance to work on hard engineering problems that do not have well-defined solutions. You will become one of the go-to experts of the LogScale language and its execution model, and will have a broad understanding of the entire LogScale architecture.
Teams in LogScale have a great amount of autonomy, and own a part of the LogScale experience, from ideation and development to deployment and feedback. This includes ensuring high quality of the features they deliver, by writing automated tests, and performing manual tests. Moreover, we do not just throw over features to our operations teams, but we constantly observe and monitor new features in production, with LogScale dashboards of course.
What You'll Do:
Work in a distributed team of friendly, trustworthy and knowledgeable colleagues
Work on cross-team platform-level initiatives and projects
Participate in scoping, designing and developing of new features and lead delivery of solutions to open-ended problems
Contribute to improving the experience of users of the language
Develop the LogScale backend in Scala and extending our product to keep LogScale scale with increasing ingest load while ensuring high availability
Communicate technical decisions through design documents, technical talks and improving our internal documentation.
Provide technical advice on decisions, and research and propose new technologies
Provide expertise on the LogScale query language
Collaborate within the team on delivery of new solutions and support team members through code reviews, pairing, documentation, design reviews and technical guidance
Monitor and followup on features released to customers on-prem and on cloud
Troubleshoot critical production issues on our customer deployments
What You'll Need:
A passion for or personal interest in distributed systems and curiosity of how our running systems are doing
Experience in software development in general and the ability to juggle making pragmatic tradeoffs between short-time delivery needs vs long-term product goals
Experience in contributing to broad technical leadership in products or services
Fluency in both functional and object oriented programming and the ability to pick up new languages on the go
A can-do attitude, and that you thrive collaborating in a team and are not afraid of taking on responsibilities
Bonus Points:
Experience programming in Scala
Experience with commercial clouds (AWS, Azure, GCP)
Experience with compilers and language design
Hands on experience in large-scale (distributed) system architecture, high scalability and availability, and optimization
Exposure to or experience with Log Management or cybersecurity products
#LI-SS1
#LI-MW1
#LI-Remote
#HTF
This role will require the candidate to periodically undergo and pass additional background and fingerprint check(s) consistent with government customer requirements.
Benefits of Working at CrowdStrike:
Remote-friendly and flexible work culture
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Great Place to Work Certified™ across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at ************************** for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $120,000 - $180,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.
For detailed information about the U.S. benefits package, please click here.
Auto-ApplySenior Logging & Detection Engineer
Logging supervisor job in Toronto, OH
Clio is the global leader in legal AI technology, empowering legal professionals and law firms of every size to work smarter, faster, and more securely. We are transforming the legal experience for all by bettering the lives of legal professionals while increasing access to justice.
Summary:
We are currently seeking a Senior Logging & Detection Engineer to lead the technical direction within our rapidly growing Security team and our new Logging Engineering team. This role is for a seasoned professional passionate about building sophisticated, scalable detection architectures, mastering efficient queries at petabyte scale, and driving strategic security analytics through log data. You will own the detection and analysis layer of our logging platform, serving as the domain expert who makes a tangible, high-impact difference to our security monitoring capabilities.
This role is available to candidates across Canada (excluding Quebec). If you are local to one of our hubs (Burnaby, Calgary, or Toronto) you will be expected to be in office minimum two days per week for our Anchor Days.
What your team does:
Are you someone who's always probing and asking why at an architectural level, someone who enjoys finding system-wide patterns in data and designing smarter, fault-tolerant detection logic? If so, we have a strategic spot for you on Clio's new Logging Engineering team! We are looking for the right candidate to develop, optimize, and serve as the technical lead for our security detection capabilities, and be the technical expert in query optimization and analytics. If you have a deep background in security analytics and senior level experience in platform-level log analysis and detection engineering, then we want to talk to you.
What you'll work on:
* Lead the design and implementation of sophisticated, production-ready detection rules and queries across the ELK stack, security data lakes, and multi-cloud logging platforms.
* Architect and optimize complex search queries, aggregations, and analytics dashboards for high-velocity security monitoring, focusing on performance and cost efficiency.
* Design and build automated detection and response workflows (SOAR), ensuring seamless and reliable integration with critical incident response systems.
* Serve as the primary liaison with the threat intelligence team, developing and owning the framework to translate intelligence into scalable, actionable detection capabilities (e.g., MITRE ATT&CK coverage).
* Establish and maintain a robust detection rule library, query templates, and lead the creation of security analytics playbooks for the wider team.
* Drive performance optimization and resource utilization strategies across petabyte-scale log datasets, including index design and data tiering.
* Develop and standardize custom visualizations, dashboards, and executive reporting capabilities for security stakeholders.
* Lead complex threat hunting operations, mentor junior team members on investigative techniques, and proactively refine detection logic to achieve near-zero false positive rates.
* Collaborate closely with the platform team to define the logging architecture roadmap based on future detection requirements and security observability goals.
* Proactively research emerging threats and attack patterns, translating novel techniques into strategic, forward-looking detection logic and advising security leadership.
What you bring:
* Senior-level expertise building and scaling enterprise-grade detection capabilities and security monitoring systems.
* Expert-level query language proficiency in at least two of the following: Elasticsearch/Lucene, SQL, KQL (Kusto), or SPL (Splunk), demonstrating advanced optimization techniques.
* Extensive Detection Engineering experience owning the full lifecycle of rules, alerts, and automated response workflows within a SIEM/SOAR environment.
* Advanced log analysis skills across diverse, large-scale data sources, including multi-cloud logs (AWS, Azure, GCP), network flows, and advanced security tool outputs.
* Deep dashboard and visualization expertise with tools like Kibana, Grafana, or Tableau, specifically for security metrics and executive reporting.
* Proven expertise in leading threat hunting efforts using log data to proactively identify and track sophisticated threats and anomalous behavior across the environment.
* Senior-level scripting and automation abilities (Python/Go/PowerShell), used to build custom tools, manage APIs, and drive detection automation at scale.
* Architectural experience integrating and optimizing SIEM platforms, SOAR tools, and security orchestration systems.
* Expert performance optimization skills covering query tuning, index design, data partitioning, and overall resource-efficient analytics on big data.
* Significant incident response experience providing expert-level technical analysis and forensic support during major security incidents.
Nice to have:
* Strategic experience with advanced analytics, machine learning, or statistical modeling for security, such as User and Entity Behavior Analytics (UEBA) or predictive threat modeling.
* Multi-platform security architecture experience across major cloud environments (AWS CloudTrail, Azure Activity Logs, GCP Audit Logs).
* Deep, practical experience building custom detection content mapped directly to the MITRE ATT&CK framework, including coverage gap analysis.
* Industry-recognized security certifications such as GCTI, GCFA, GNFA, or CISSP.
* Track record of open source contributions to detection rule repositories, security analytics tools, or SIEM content.
* Data science or advanced mathematics background with direct experience in anomaly detection, clustering, or predictive analytics for security.
* Expert API integration skills for automated, real-time threat intelligence ingestion and centralized detection rule management.
* Cloud security analytics mastery utilizing cloud-native security services (e.g., Security Hub, Defender for Cloud) and serverless detection architectures.
* Compliance and reporting leadership experience building analytics and dashboards for regulatory requirements (e.g., SOC 2, ISO 27001) and defining key security metrics.
This is a new role.
What you will find here:
Compensation is one of the main components of Clio's Total Rewards Program. We have developed a series of programs and processes to ensure we are creating fair and competitive pay practices that form the foundation of our human and high-performing culture.
Some highlights of our Total Rewards program include:
* Competitive, equitable salary with top-tier health benefits, dental, and vision insurance
* Hybrid work environment, with expectation for local Clions (Vancouver, Calgary, Toronto, Dublin and Sydney) to be in office min. twice per week.
* Flexible time off policy, with an encouraged 20 days off per year.
* $2000 annual counseling benefit
* RRSP matching and RESP contribution
* Clioversary recognition program with special acknowledgement at 3, 5, 7, and 10 years
The expected salary range* for this role is $146,200 to $172,000 to $197,800 CAD. There are a separate set of salary bands for other regions based on local currency.
* Our salary bands are designed to reflect the range of skills and experience needed for the position and to allow room for growth at Clio. For experienced individuals, we typically hire at or around the midpoint of the band. The top portion of the salary band is reserved for employees who demonstrate sustained high performance and impact at Clio. Those who are new to the role may join below the midpoint and develop their skills over time. The final offer amount for this role will be dependent on geographical region, applicable experience, and skillset of the candidate.
Diversity, Inclusion, Belonging and Equity (DIBE) & Accessibility
Our team shows up as their authentic selves, and are united by our mission. We are dedicated to diversity, equity and inclusion. We pride ourselves in building and fostering an environment where our teams feel included, valued, and enabled to do the best work of their careers, wherever they choose to log in from. We believe that different perspectives, skills, backgrounds, and experiences result in higher-performing teams and better innovation. We are committed to equal employment and we encourage candidates from all backgrounds to apply.
Clio provides accessibility accommodations during the recruitment process. Should you require any accommodation, please let us know and we will work with you to meet your needs.
Learn more about our culture at clio.com/careers
We're a Human and High Performing AI company, meaning we use artificial intelligence to improve all of our operations. In recruitment, AI helps us streamline the process for greater efficiency. However, we've built our systems to ensure that a human always reviews AI-generated output, and we never make automated hiring decisions.
Disclaimer: We only communicate with candidates through ****************** email addresses.
Auto-Apply