
location_on5798, West Liberty Road, Scio Township, Washtenaw County, Michigan, 48103, United States
KLA is a global leader in diversified electronics for the semiconductor manufacturing ecosystem. Virtually every electronic device in the world is produced using our technologies. From laptops and smartphones to wearable devices, voice-controlled gadgets, flexible screens, VR devices, and smart cars, KLA's innovations are foundational to their existence. We invent systems and solutions for the manufacturing of wafers, reticles, integrated circuits, packaging, printed circuit boards, and flat panel displays.
Our innovative ideas and devices that advance humanity begin with inspiration, research, and development. KLA invests 15% of sales back into R&D, focusing more than average on innovation. Our expert teams of physicists, engineers, data scientists, and problem-solvers work together with the world's leading technology providers to accelerate the delivery of tomorrow's electronic devices. Life here is exciting, and our teams thrive on tackling really hard problems. There is never a dull moment with us.
The Cybersecurity group at KLA is involved in every aspect of the global business. We defend against cyber-attacks and provide cybersecurity tools, incident response services, and assessment capabilities to safeguard the environments that support the essential operations of KLA. We are passionate about identifying adversarial activities and anticipating a wide variety of threats to strengthen our defenses and the overall protection of KLA Intellectual Property.
As an Endpoint Detection Engineer, you will serve as the hands-on subject matter expert for our enterprise endpoint detection platforms. This role is responsible for the configuration, tuning, lifecycle management, and continuous improvement of our EDR and EPM tooling from a cybersecurity perspective. You will ensure the platform is optimally deployed, deeply integrated with our broader security stack, and proactively evolving to address emerging threats.
You will partner closely with the SOC and IT Security teams to align detection capabilities with operational workflows, serving as the primary technical liaison. This position offers the opportunity to work in a dynamic environment where you will define endpoint hardening standards, evaluate new platform features, and drive the adoption of enhancements that strengthen our security posture.
KLA follows a recruiting process that involves multiple interviews in person or on video conferencing with our hiring managers. If you are concerned that a communication, an interview, an offer of employment, or that an employee is not legitimate, please send an email to talent.acquisition@kla.com to confirm the person you are communicating with is an employee.
KLA is proud to be an Equal Opportunity Employer. We will ensure that qualified individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us at talent.acquisition@kla.com or at +1-408-352-2808 to request accommodation.
We take your privacy very seriously and confidentially handle your information. Be aware of potentially fraudulent job postings or suspicious recruiting activity by persons posing as KLA employees. KLA never asks for any financial compensation to be considered for an interview, to become an employee, or for equipment. Further, KLA does not work with any recruiters or third parties who charge such fees either directly or on behalf of KLA. Please ensure that you have searched KLA's Careers website for legitimate job postings.
Work model: On-site
5798, West Liberty Road, Scio Township, Washtenaw County, Michigan, 48103, United States
Scio Township, Michigan
Experience supporting or participating in red team, purple team, or adversary simulation exercises. Malware analysis or reverse engineering experience. Familiarity with digital forensics tooling and methodology (e.g., KAPE / Zimmerman Tools) for endpoint artifact analysis. Familiarity with MDM/MAM solutions (Intune, JAMF, Workspace ONE) and their interplay with endpoint security tooling. Working knowledge of security hardening benchmarks (CIS Controls, NIST 800-53) and how to operationalize them at the endpoint layer. Experience in regulated or large enterprise environments with compliance requirements (PCI-DSS, ISO 27001, or similar). Relevant certifications such as GCDA, GREM, GCIH, or platform-specific certifications. Linux experience. Experience with query languages such as KQL or SPL.