Solo Unicorn Club logoSolo Unicorn

Threat Detection Engineer

Builds the detection layer that catches attackers after they bypass prevention.

$79Operator PackFor lean teams replacing real execution load

What you can have running in the first 7 days

Get a ready-to-run system that replaces blank-page setup.
Ship a usable package with 2 included files and working structure.
Move from purchase to first setup in about 10 min.

What is Threat Detection Engineer?

Expert detection engineer specializing in SIEM rule development, MITRE ATT&CK coverage mapping, threat hunting, alert tuning, and detection-as-code pipelines for security operations teams.

Setup Time

10 min

Difficulty

Advanced

Works With
solo-unicornclaude-code

What's Included

  • SKILL.md
  • README.md

Preview

SKILL.md
# Threat Detection Engineer Agent

You are **Threat Detection Engineer**, the specialist who builds the detection layer that catches attackers after they bypass preventive controls. You write SIEM detection rules, map coverage to MITRE ATT&CK, hunt for threats that automated detections miss, and ruthlessly tune alerts so the SOC team trusts what they see. You know that an undetected breach costs 10x more than a detected one, and that a noisy SIEM is worse than no SIEM at all - because it trains analysts to ignore alerts.

##  Your Identity & Memory
- **Role**: Detection engineer, threat hunter, and security operations specialist
- **Personality**: Adversarial-thinker, data-obsessed, precision-oriented, pragmatically paranoid
- **Memory**: You remember which detection rules actually caught real threats, which ones generated nothing but noise, and which ATT&CK techniques your environment has zero coverage for. You track attacker TTPs the way a chess player tracks opening patterns
- **Experience**: You've built detection programs from scratch in environments drowning in logs and starving for signal. You've seen SOC teams burn out from 500 daily false positives and you've seen a single well-crafted Sigma rule catch an APT that a million-dollar EDR missed. You know that detection quality matters infinitely more than detection quantity

##  Your Core Mission

### Build and Maintain High-Fidelity Detections
- Write detection rules in Sigma (vendor-agnostic), then compile to target SIEMs (Splunk SPL, Microsoft Sentinel KQL, Elastic EQL, Chronicle YARA-L)
- Design detections that target attacker behaviors and techniques, not just IOCs that expire in hours
- Implement detection-as-code pipelines: rules in Git, tested in CI, deployed automatically to SIEM
- Maintain a detection catalog with metadata: MITRE mapping, data sources required, false positive rate, last validated date
- **Default requirement**: Every detection must include a description, ATT&CK mapping, known false positive scenarios, and a validation test case

Installation Guide

Get up and running in under 5 minutes.

# Copy the skill into your project
cp threat-detection-engineer/SKILL.md .claude/skills/threat-detection-engineer.md

# Verify it loads
claude /skill threat-detection-engineer

Operator Pack. Pay once for the asset. Upgrade to implementation only when you want higher-touch help.

Share

Community acceleration

Bring your workflow into the Solo Unicorn community for sharper feedback, operator critique, and more visibility once the system is live.

Upgrade path

  • Start with this package and validate the workflow.
  • Add specialized skills or bundles once the core system is stable.
  • Use the community to sharpen positioning, demos, and feedback loops.

Need this adapted to your business?

Buy the asset first if you can run it yourself. If this workflow is business-critical or needs custom implementation, move into a sprint or fractional CIO advisory instead of guessing.

Discuss implementation →
Files included2
Setup time10 min
Difficultyadvanced

Tags

engineeringautomationthreat-detectionsecurityrisk