/> Update cookies preferences

C2 Corner: Detection Doesn’t Fail First: Data Does

C2 Corner: Detection Doesn’t Fail First: Data Does

Brandon Bischoff
Chris Camacho
C2 Corner
December 17, 2025

When security incidents make headlines, detection engineers and threat hunters typically receive well-deserved recognition for identifying threats and stopping attacks. Yet behind every successful detection and every effective threat hunt lies a critical invisible partner, security engineering.

Security engineering provides the foundation that makes detection possible, including the logging infrastructure, telemetry pipelines, normalized data formats, and instrumented systems that give defenders the visibility they need. Without this foundation, even the most sophisticated detection rules would have nothing to analyze, and threat hunters would be searching in the dark.

This collaboration between security engineering and detection teams represents one of the most important, and least discussed, partnerships in modern cybersecurity.

Telemetry

Detection engineering and threat hunting are fundamentally dependent on data. Security telemetry involves data collection, analysis, and interpretation from various IT infrastructure sources to monitor for suspicious activities, vulnerabilities, or potential breaches. The quality, availability, and structure of that data directly determines what threats can be detected and how quickly hunters can operate.

Security engineers build and maintain the telemetry infrastructure that collects this critical data. Core infrastructure is equipped with customized security agents that generate detailed telemetry and provide host-based intrusion detection, creating the visibility that downstream security operations depend upon.

This isn't just about turning on logging. Security telemetry enables the early identification of anomalous or malicious activities within a network, and timely access to relevant data allows security teams to respond swiftly to incidents. When security engineering gets telemetry right, detection engineers can build high-fidelity rules and threat hunters can move quickly through investigations.

When telemetry infrastructure fails, through gaps in coverage, poor data quality, or performance issues, even the best detection rules become ineffective, and threat hunts slow to a crawl.

Consistency Enables Effective Hunting

Threat hunters operate under time pressure; adversaries move quickly, and delayed visibility means missed opportunities to contain attacks. Security engineering directly impacts how fast hunters can work through the performance characteristics of telemetry systems.

Logs are processed in near real-time by using rule-based, statistical, and machine learning methods to detect system performance indicators and potential security events. When security engineers optimize data collection and processing pipelines, detection alerts fire faster and threat hunters receive fresher data to investigate.

Storage architecture matters too. Security engineers who implement efficient data lakes and hot/warm/cold storage tiers enable threat hunters to query historical data quickly when conducting retrospective hunts or investigating the full scope of an incident.

The Collaboration Model

The most effective organizations recognize that security engineering and detection/hunting teams must work as partners, not isolated functions.

Behavioral baselines in cloud environments require close collaboration with DevOps teams for contextual understanding, and the same principle applies internally. Detection engineers should work with security engineering teams to identify visibility gaps, prioritize new telemetry sources, and ensure logging configurations capture the right events.

When detection engineers struggle with data quality issues, such as parsing failures, missing fields, or inconsistent formats, that feedback should flow directly to security engineering teams who can fix upstream problems. Similarly, when threat hunters identify systems without adequate logging, security engineers can prioritize instrumentation improvements.

Decisions about telemetry architecture, including what to collect, how to normalize it, and where to store it, should involve both security engineering and detection teams. Determine your goals, whether it's early threat detection, incident response improvement, or compliance monitoring. Clear objectives provide direction for your telemetry strategy.

Security engineering doesn't just enable detection; it acts as a force multiplier for the entire detection and hunting program.

Security engineers build automation that accelerates detection development and hunting workflows. When security events that trigger alerts require responsive action or further investigation of forensic evidence throughout the service, cloud-based tools allow for rapid response throughout the environment.

As organizations grow, security engineering ensures that telemetry infrastructure scales without degrading performance. The scale of telemetry generated by modern infrastructures is immense. High-frequency data streams from endpoints, cloud workloads, network devices, and applications can overwhelm ingestion pipelines and SIEM platforms. Security engineers design architectures that handle this volume while maintaining the data quality and latency that detection and hunting teams require.

Modern detection engineering practices treat detection logic as software. A Continuous Integration/Continuous Deployment (CI/CD) pipeline can be a key driver for security teams wanting to shift security left. When you use a CI/CD pipeline, you can easily enforce testing and linting checks. Security engineers build and maintain these CI/CD systems that allow detection teams to iterate rapidly on detection logic.

Addressing Challenges Together

Several persistent challenges in detection and threat hunting can only be solved through close collaboration with security engineering.

Detection rules that assume certain telemetry will be available break when that data source becomes unavailable. Security engineers can implement monitoring and alerting on telemetry pipelines themselves, ensuring detection teams know immediately when visibility degrades.

When detection teams struggle with alert fatigue from noisy data sources, security engineers can implement upstream filtering, aggregation, or sampling to reduce volume while preserving security-relevant signals. Improve searchability, support advanced dashboards, and reduce investigation time with structured and contextualized logs.

Threat hunters who spend hours waiting for search results to return can't operate effectively. Security engineering teams optimize data architecture, implementing proper indexing, partitioning, and caching strategies, to ensure queries execute quickly enough for interactive hunting.

Looking Forward

Several trends are reshaping the collaboration between security engineering and detection teams.

Extended Detection and Response (XDR) platforms integrate telemetry from endpoints, networks, identities, email, and cloud into a unified detection layer. This consolidation reduces alert fatigue by correlating signals across domains and improves triage accuracy through context-rich detections. Security engineers play a key role in integrating diverse telemetry sources into these unified platforms.

Zero Trust architectures demand granular, continuous telemetry from users, devices, and applications to support adaptive access control. This telemetry data includes session context, identity signals, device posture, and microsegmentation policies. Security engineers must instrument these identity and access signals to enable detection rules that identify anomalous access patterns.

Machine learning models use incoming log data and historical log data to continuously improve detection capabilities. Security engineers build the data pipelines and feature engineering infrastructure that feed these models, ensuring they receive high-quality training data and operate efficiently at scale.

Conclusion

Security engineering provides the essential infrastructure that makes detection and threat hunting possible. From building telemetry pipelines that collect and normalize data, to designing performant storage architectures that enable rapid queries, to implementing the CI/CD systems that support detection-as-code, security engineers create the foundation upon which effective threat detection is built.

This partnership between security engineering and detection teams represents more than just operational collaboration. It's a force multiplier that enables organizations to detect threats earlier, hunt more efficiently, and respond more effectively to security incidents.

The most successful security programs recognize that detection engineering and security engineering are not separate domains but complementary disciplines that must work in tight coordination. When security engineers understand the detection requirements of their partners, and when detection teams appreciate the engineering constraints and capabilities of their infrastructure, both teams become more effective.

As threats continue to evolve and environments grow more complex, this collaboration will only become more critical. Organizations that invest in building strong partnerships between security engineering and detection teams, with clear communication channels, shared goals, and mutual respect for each discipline's expertise, will find themselves better positioned to defend against increasingly sophisticated adversaries.

After all, the best detection rule in the world is useless without data to analyze, and the most sophisticated telemetry infrastructure adds no value if no one is using it to detect threats. Together, these teams create something greater than the sum of their parts: a comprehensive, effective defense.

C2 Thoughts

Detection doesn’t fail because teams lack talent or ideas. It fails when the underlying data, telemetry, and infrastructure were never designed to support modern detection in the first place.

From where I sit, this is one of the most under-discussed realities in security operations today.

Telemetry is the product, not an afterthought. Detection engineering and threat hunting are fundamentally dependent on data. Security telemetry is not just “logs.” It is the collection, analysis, and interpretation of signals across infrastructure that determine what you can detect and how fast you can act.

Security engineers are the ones who make this possible. They build and maintain the pipelines, agents, and systems that generate high-quality telemetry and deliver it downstream in a usable form.

This is not about flipping logging on and hoping for the best. When telemetry is designed intentionally, detection engineers can build high-fidelity rules and threat hunters can move quickly. When it isn’t, even the best detection logic collapses under poor data quality, gaps in coverage, or pipeline failures.

References
  1. Promon. What is Security Telemetry and Why is it Important? https://promon.co/security-news/what-is-security-telemetry/
  1. Microsoft Security. Understanding Security Telemetry Infrastructure.  
  1. Proofpoint. The Importance of Security Telemetry in Modern Threat Detection.  
  1. Deepwatch. Real-Time Log Processing and Security Event Detection.
  1. Cisco. Building Behavioral Baselines in Cloud Environments.
  1. Splunk. Developing a Strategic Telemetry Architecture.
  1. Google Cloud. Cloud-Based Security Automation and Response.
  1. Splunk. Scaling Telemetry Infrastructure for Enterprise Security.
  1. Cloud Security Alliance. Detection-as-Code: Implementing CI/CD for Security Detection.
  1. Datadog. Structured Logging for Enhanced Security Investigation.
  1. Cymulate. Extended Detection and Response (XDR) Platform Architecture.
  1. Microsoft Security. Zero Trust Telemetry and Identity-Based Detection.

Show Transcript
Get In Touch