Common JD Requirement Checklist
- Sysmon event coverage scope (process creation, network, image load, registry, WMI)
- Rule logic format and deployment pipeline (Sigma to SIEM translation workflow)
- Detection validation method (attack emulation, replay tests, false-positive review)
- Operational constraints (endpoint performance impact and rule tuning cadence)
- Data engineering dependencies (log normalization, enrichment, schema integrity)
- Collaboration model between detection engineering and SOC operations