# Sean McNierney > M.S. Cybersecurity - GMON Location: New York, New York, United States Profile: https://flows.cv/seanmcnierney Energetic and passionate Detection Engineer ## Work Experience ### Threat Detection Engineer @ TikTok USDS Joint Venture Jan 2024 – Present | New York City Metropolitan Area ### Threat Detection Engineer @ Peloton Interactive Jan 2023 – Jan 2024 | New York, New York, United States • Spearheaded the development and foundational implementation of a robust threat detection engineering program. • Formulated a comprehensive maturity matrix for the detection engineering program, establishing a systematic approach to monitor and enhance its processes over time. • Collaborated in the effective utilization of a diverse array of security tooling, such as Cloudflare, Area1, Cisco Umbrella, CrowdStrike EDR, Splunk, Hunters AI, Office 365, Wiz, and NoName to enhance and fortify the organization's security posture. • Conducted pen-test reviews, meticulously tracking progress and collaborating with the broader security organization to implement robust controls for enhanced system hardening. • Engaged in proactive research and collaborated with threat intelligence analysts to devise effective threat detections across Splunk and CrowdStrike EDR. • Successfully led proof-of-concept initiatives and evaluated threat detection platforms, significantly boosting visibility and coverage with immediate impact. • Utilized Tines SOAR automation tool to streamline and enrich alerting from external SOC, enhancing overall response efficiency. • Orchestrated the automation of phishing remediation processes via Tines, transitioning from manual procedures to a one-click style of automation. This involved leveraging security tooling APIs to address file hashes, domains, malicious sender addresses, and promptly removing malicious emails from users' inboxes. • Engineered an automated ticket creation system via Tines from external SOC, significantly improving traceability of Key Performance Indicators (KPIs) for security analysts. •Facilitated communication with stakeholders and implemented strategic processes to elevate the security posture of applications dealing with Personally Identifiable Information (PII), including SAP and in-house applications. ### Threat Detection Engineer - Tier 1 Senior @ ReliaQuest Jan 2023 – Jan 2023 | Tampa, Florida, United States • Built automated threat detection frameworks using the GreyMatter Detect platform. • Specialized in Splunk detection templates across various log source types for GreyMatter Detect. • Perform R&D to build customized ADHOC detections that are not available in our detection library for customers based on detection needs. Example detections include unauthorized access to customer defined critical assets and customized MFA fatigue and fraud attacks. • Utilize GitLab to maintain and approve merge requests for SPL based detections for internal detection library. • Present the capabilities of the GreyMatter Detect platform to customers. ### Implementations Detection Architect @ ReliaQuest Jan 2022 – Jan 2023 | Tampa, Florida, United States • Collaborated with new customers to assess current security tool stack and environment. Implement foundational detections using SIEM technologies based around the customer security stack. • Conducted discussions and presentations with customers at all levels to address their security concerns and develop customized detection roadmaps for future use-case implementation. • Developed detection road maps leveraging MITRE and Kill Chain frameworks to ensure customers are gaining visibility in gap areas to build towards a better security posture. ### Associate Threat Detection Engineer @ ReliaQuest Jan 2021 – Jan 2022 | Tampa, Florida, United States • Quickly learned to build detections in SIEM technologies such as Qradar, Splunk, LogRhythm, Devo, and Azure Sentinel. • Collaborated with security analysts to review tuning opportunities for deployed detections in customer SIEM environments. • Communicated with customers to ensure detection use-cases were tailored and customized to their preferences. • Performed R&D to build detections around new log source types. Examples include building GitLab detections to monitor major auditing events such as large exports of branches or unauthorized users merging into customer critical branches. • Evaluated detection capabilities in emerging SIEM technologies such as Humio to review if the SIEM technology would be a good fit in combination with GreyMatter platform. ### Threat Analyst @ Stetson CyberGroup Jan 2020 – Jan 2021 | Hauppauge, New York, United States • Utilized Sophos Intercept X (EDR) and Skout for endpoint security on client systems to discover threats and investigate. • Performed threat hunts with tools such as Thor, Cyber Triage, Sparrow, and in-house built PowerShell scripts to hunt down malware during assessments. • Performed vulnerability assessments for clients to discover gaps and remediate them. • Assisted audit team with ensuring clients reach compliance and implement proper controls to secure infrastructure. Some compliance examples include: o NIST o HIPPA ### Junior Support Specialist @ AriZona Beverage Co. Jan 2019 – Jan 2020 | Woodbury, NY ● Worked directly with CISO to sync on-premises active directory with Azure to advance IAM practices. ● Lead mobile device management project by transferring over 200+ tablets and phones to IBM Maas360 and created policies for devices to restrict users' access. ### Retail Merchandising Intern @ AriZona Beverage Co. Jan 2018 – Jan 2018 Managed inventory at 20+ Long Island accounts and relayed progress to Department of Retail Merchandising. Maintained communication between individual Account Managers and Director of Retail Merchandising in order to ensure customer demand was being adequately satisfied. ### Help Desk Technician / On-site Support Specialist @ Nerds That Care – IT Experts & Cyber Security Specialists Jan 2014 – Jan 2016 | Bohemia, NY Duties included ensuring proper computer operation so that users can accomplish business tasks. Specific tasks included: • Record and keep track of help desk request problem-solving process, including all successful and unsuccessful attempts made through to the final resolution • Applied diagnostic utilities to aid in troubleshooting • Identified and learned specific software and hardware used and supported by an organization • Used Malwarebytes and CCleaner to fix any performance issues • Installed and upgraded software such as operating systems and Microsoft Office, implemented file backups, and configured systems and applications per user request • Installed computers, scanners, printers, servers, routers/switches and ensured users are connected and operational ## Education ### Master of Science - MS in Cybersecurity - Malware Analysis Specialization Utica University ### Communications in Minor in Computer Applications and Programming State University of New York Cortland ## Contact & Social - LinkedIn: https://linkedin.com/in/sean-mcnierney --- Source: https://flows.cv/seanmcnierney JSON Resume: https://flows.cv/seanmcnierney/resume.json Last updated: 2026-04-13