Threat Intelligence Researcher-Automated Detection
Arctic Wolf
At Arctic Wolf, we're not just navigating the cybersecurity landscape - we're redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: we've earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award. We’re proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers' Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRN’s Products of the Year award in the inaugural Security Operations Platform category. Join a company that’s not only leading, but also shaping, the future of security operations.
Our mission is simple: End Cyber Risk. We’re looking for a Security Researcher, Automated Detection to be part of making that happen.
About the Role
The Detection Automation team is responsible for a detection automation pipeline to translate detection candidates from Threat Intelligence, Security, and Detection researchers into detection artifacts that ensure a timely release to our Security Services teams. As a detection researcher on our Detection Automation team, you will be responsible for researching & authoring detections in an automated flow, identifying opportunities to improve the automated detection flows, and enabling detection researchers from across the organization to author automated detections. The detection automation team ensures quality and scale of our automated detection base and presents actionable detections to our Security Services teams and customers.
Arctic Wolf Labs is the research-focused division at Arctic Wolf focused on advancing innovation in the field of security operations. The mission of Arctic Wolf Labs is to develop cutting-edge technology and tools that are designed to enhance the company’s core mission to end cyber risk, while also bringing comprehensive security intelligence to Arctic Wolf’s customer base and the security community-at-large. Leveraging the more than two trillion security events the Arctic Wolf Security Operations Cloud ingests, parses, enriches, and analyzes each week, Arctic Wolf Labs is responsible for performing threat research on new and emerging adversaries, developing advanced threat detection models, and driving improvement in the speed, scale, and detection abilities of Arctic Wolf’s solution offerings. The Arctic Wolf Labs team comprises security and threat intelligence researchers, data scientists, security development engineers with deep domain knowledge in artificial intelligence (AI), security R&D, as well as advanced threat offensive and defensive methods and technologies. Security Research Services Development partners with these groups to understand requirements, design & implement scalable, fault-tolerant solutions, and build the next generation of security capabilities for Arctic Wolf.
Responsibilities Include:
· Develop and maintain SQL, Python and YAML-based detections-as-code
· Research and develop expertise in the various threat surfaces and telemetry available for them
· Propose coverage and efficacy improvements to the detection surface
· Work with team members to develop novel detections and continuously tune existing ones
· Build runbooks, reports and supporting material for detection surfaces
· Collaborating with cross-functional teams to gather requirements and implement detections.
· Write clean, efficient, and reusable script in Python, bash, or macro.
· Conduct code reviews and provide constructive feedback to ensure code quality and maintainability.
· Debug and fix issues in existing Python codebases.
· Optimize application and query performance to ensure scalability.
· Understand the product and how Security Services delivers the service.
· Develop professional expertise, apply company policies and procedures to resolve a variety of issues. Determine a course of action based on guidelines, and modify processes and methods as required.
· Continuously learn and adopt best practices for detections-as-code, code quality, software development methodologies, and programming principles to enhance coding skills and stay updated with industry advancements.
· Capable of malware analysis and families and emerging threats using established methodologies.
· Support ongoing tracking of threat actors and campaigns.
· Expert Positioning Goal:
o Present at 1 local cybersecurity meetup, brown bag, or internal R&D showcase per year.
· Example Key Results:
o Authored 5 YARA/Sigma rules with >95% accuracy validated in QA.
o Delivered internal briefing on malware behavior observed in a recent campaign.
o Contributed technical write-ups used in 2 customer intelligence summaries.
About You
You’re a talented threat intelligence researcher / detection developer loves building things and cares deeply about code quality and reliability while optimizing performance. You enjoy coordinating with distributed cross-functional teams. You are constantly adapting to emerging technologies, trends, and best practices. You will build productive internal/external working relationships to resolve mutual problems by collaborating on procedures or transactions, with a focus on providing standard professional advice and creating initial reports/analyses for review by experienced team professionals.
Here are some of the core technologies we use and teach across our detection teams:
- Python
- Yara
- SQL
- Sigma
- Suricata
- Wazuh
- Kibana
- Git
You are not required to be an expert in any of these, but you should be excited by the opportunity to learn new things and comfortable with coming up to speed quickly. Any experience with detection development or full-stack development frameworks and practices is relevant and transferrable.
WE’RE LOOKING FOR SOMEONE WITH:
- 2 or more years of professional experience as a Threat Intelligence Researcher / Detection Developer
- Experience consists of projects contributing in either Python or YAML
- OS Specific Telemetry (Windows Security/Sysmon logs, Linux)
- Expertise in Windows PowerShell Monitoring
- Understanding of the authoring lifecycle of SIEM Detections and Detection artifacts
- EDR detections/signatures
- Sigma and Yara Rules
- Streaming and batch-based detections
- Threat hunting & detection research
- Development of anomaly and behavioral based detections
- Demonstrated experience authoring and enabling Detections-as-Code
- Experience tuning and optimization of detections for all the above
- Experience consists of working in a team of 2 or more Detection Developers while contributing code independently
- Nice to have:
- A clear history of technical influence (public conference talks, papers, etc)
- Professional certifications in Security and/or Cloud (i.e. CISSP, GNFA, GCFA, GCFE, GREM).
- Experience working in Agile development teams, preferably with formal Agile training
- A clear history of learning and skills development. Regularly helps detection developers develop their skills in a variety of ways.
- Bachelor’s in computer science with exposure in cyber security
At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work – USA (2021-2024), Great Place to Work – Canada (2021-2024), Great Place to Work – UK (2024), and Kununu Top Company – Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry.
Our Values
Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion,and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that—by protecting people’s and organizations’ sensitive data and seeking to end cyber risk— we get to work in an industry that is fundamental to the greater good.
We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here.
We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities.
All wolves receive compelling compensation and benefits packages, including:
· Equity for all employees
· Flexible annual leave, paid holidays and volunteer days
· Training and career development programs
· Comprehensive private benefits plan including medical insurance for you and your family, life insurance (3x compensation), and personal accident insurance.
· Fertility support and paid parental leave
Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing recruiting@arcticwolf.com.
Security Requirements
Conducts duties and responsibilities in accordance with AWN’s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies).
Background checks are required for this position.