Menu

The Journey Begins: My Path to Becoming a Detection Engineering SME

Every cybersecurity professional has that moment — a realization that this field is vast, fascinating, and constantly evolving. For me, that moment came while discussing frustrations with co-workers over our false positive rate, and thinking: "There has to be a better way."

That thought sparked a deeper curiosity, and now, I’ve decided to document my journey to becoming a Subject Matter Expert (SME) in four key areas I believe are critical to the modern defender:

  • SIEM (Security Information and Event Management)
  • Logging and telemetry best practices
  • Open Source Intelligence (OSINT)
  • Detection Engineering

Why These Areas?

Each of these disciplines plays a massive role in building effective threat detection and response capabilities:

  • SIEM gives us visibility.
  • Logging gives us context.
  • OSINT gives us insight.
  • Detection Engineering gives us power.

The more I learn, the more I realize that strong detections aren't just rules—they’re built from good data, strong hypotheses, and repeatable, testable engineering.

My Roadmap

've created a structured roadmap to guide my progress. It spans from fundamentals (networking, log formats, MITRE ATT&CK) to more advanced skills like:

  • Writing and testing Sigma rules
  • Automating detection deployment via CI/CD
  • Scaling SIEM pipelines
  • Gathering and visualizing OSINT for enrichment
  • Building a detection content repo with full lifecycle management

I’ll be sharing resources, tools, labs, setbacks, breakthroughs, and personal reflections here on this blog.

What to Expect

My upcoming posts will include:

  • Lab setups and walkthroughs (Elastic, Splunk, HELK, Wazuh, etc.)
  • Deep dives into detection rule tuning and testing
  • Lessons learned while building a detection-as-code pipeline
  • OSINT workflows for defenders
  • Threat hunting scenarios and MITRE ATT&CK coverage