Whoop company logo

Whoop is hiring a Security Detection Engineer

Get the latest jobs to your inbox!

Job Description

<div>

<p style="background-color: #ffffff; margin-top: 15pt; margin-bottom: 0pt; padding-bottom: 15pt;"><span style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">At WHOOP, we’re on a mission to unlock human performance.

WHOOP empowers members to perform at a higher level through a deeper understanding of their bodies and daily lives.</span>

<p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">WHOOP is seeking a Security Detection Engineer to serve as a key technical contributor within our Information Security team, reporting to the Information Security Manager.

In this role, you will drive the design and evolution of high-fidelity, scalable detection capabilities that protect millions of members’ biometric and health data.</span>

<p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 12pt;"><span style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">You will help define our detection engineering strategy across cloud, identity, endpoint, and application environments, ensuring depth of coverage, signal precision, and resilience against modern attacker tradecraft.

This is an opportunity to shape a growing detection program within a rapidly evolving Information Security team.</span>

</div></br><b>

RESPONSIBILITIES

  • </b></br><div>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Design, build, and scale high-signal detections across cloud, identity, endpoint, network, and application layers using Detection-as-Code principles.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Develop and maintain detection logic aligned to real-world attacker behavior and frameworks such as MITRE ATT&CK across modern security platforms.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Translate threat intelligence into actionable detections and validate effectiveness through adversary emulation and testing.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Build behavioral detections to protect against threats such as account takeover, credential abuse, API misuse, automation attacks, privilege escalation, and data exfiltration.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Continuously improve detection quality by tuning alerts, reducing false positives, and implementing automated enrichment and triage.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Define and track detection KPIs (e.g., precision, recall, false positive rate, MTTD) and implement processes to measure and improve detection health.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Support and lead incident investigations, including containment, root cause analysis, and post-incident detection improvements.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Contribute to the on-call rotation while proactively reducing operational overhead through automation.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Partner with Engineering, IT, Infrastructure, Product, and GRC to ensure systems launch with strong monitoring and detection coverage.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Map detections to threat models, identify visibility gaps, and continuously improve coverage as the environment scales.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Explore and apply advanced analytics and machine learning techniques to improve detection fidelity, reduce noise, and enhance triage and investigation workflows.</span></li>
  • <li style="background-color: #ffffff;"><span style="font-size: 12pt;">Stay ahead of evolving threats by researching emerging attack techniques and incorporating learnings into detection strategy.</span></li>
  • </div></br><b>

QUALIFICATIONS

  • </b></br><div>
  • <ul style="margin-top: 0px; margin-bottom: 0px; padding-inline-start: 48px;">
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 12pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">4+ years of hands-on experience in Information Security, with a focus on detection engineering, threat detection, or security operations.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Demonstrated experience writing and tuning detections across cloud, identity, endpoint, or application environments.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Familiarity with detection frameworks and tooling such as YARA, SIGMA, Suricata, or similar rule-based detection methodologies.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Strong understanding of attacker techniques across identity compromise, cloud abuse, lateral movement, and data exfiltration.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Expertise analyzing and building detections on cloud and SaaS telemetry, including authentication events, API activity, and system logs.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Strong scripting skills in a scripting language such as Python, Go, or PowerShell for automation and tool development.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Ability to operate effectively in a fast-paced, high-growth environment.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Strong analytical mindset with a systems-thinking approach to reducing noise and increasing signal fidelity.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Experience supporting incident response investigations and participating in on-call rotations.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Experience building detective controls for consumer-facing platforms or detecting authentication and API abuse at scale is a strong plus.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Effective communicator who can collaborate with engineers and explain detection strategy clearly to both technical and non-technical stakeholders.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt;"><span style="font-size: 12pt;">Familiarity with applying data analysis or machine learning techniques to security detection or alert triage is a plus.</span>
  • </li>
  • <li style="font-size: 12pt; font-family: Roboto, sans-serif; color: #0d0d0d;">
  • <p style="background-color: #ffffff; margin-top: 0pt; margin-bottom: 12pt;"><span style="font-size: 12pt;">Bachelor’s degree in Computer Science, Information Security, or a related technical field, and/or relevant security certifications are a plus.</span>
  • </li>
  • </ul></div></br><div>
  • <em>Interested in the role, but don’t meet every qualification?
  • We encourage you to still apply!
  • At WHOOP, we believe there is much more to a candidate than what is written on paper, and we value character as much as experience.
  • As we continue to build a diverse and inclusive environment, we encourage anyone who is interested in this role to apply.</em>
  • <em>WHOOP is an Equal Opportunity Employer and participates in E-verify to determine employment eligibility.
  • It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment.
  • An employer who violates this law shall be subject to criminal penalties and civil liability.</em>
  • <em>The WHOOP compensation philosophy is designed to attract, motivate, and retain exceptional talent by offering competitive base salaries, meaningful equity, and consistent pay practices that reflect our mission and core values.</em>
  • <em>At WHOOP, we view total compensation as the combination of base salary, equity, and benefits, with equity serving as a key differentiator that aligns our employees with the long-term success of the company and allows every member of our corporate team to own part of WHOOP and share in the company’s long-term growth and success.</em>
  • <em>The U.S. base salary range for this full-time position is $130,000 - $170,000.
  • Salary ranges are determined by role, level, and location.
  • Within each range, individual pay is based on factors such as job-related skills, experience, performance, and relevant education or training.&nbsp;</em>
  • <em>In addition to the base salary, the successful candidate will also receive benefits and a generous equity package.</em>
  • <em>These ranges may be modified in the future to reflect evolving market conditions and organizational needs.
  • While most offers will typically fall toward the starting point of the range, total compensation will depend on the candidate’s specific qualifications, expertise, and alignment with the role’s requirements.</em>
  • </div>
Sponsored
⭐ Featured Partner

Explore Biotech Careers

Discover exciting opportunities in biotechnology. Join innovative companies that are advancing healthcare and life sciences through cutting-edge research and development.

Remote FriendlyCompetitive SalaryBiotech

Salary Information

Salary: $135,000 - $165,000

🤖 This salary estimate is calculated by AI based on the job title, location, company, and market data. Use this as a guide for salary expectations or negotiations. The actual salary may vary based on your experience, qualifications, and company policies.

Compare salaries in Boston

Create a Job Alert

Interested in building your career at Whoop? Get future opportunities sent straight to your email.

Create Alert

Related Opportunities

Discover similar positions that might interest you