Sr. Developer- Observation Reduction
Arctic Wolf Networks
A Senior Security Analyst has a clear history of successful contribution to technical projects. They are driven, curious, and results oriented.
They are able to manage competing priorities as they relate to improving the value of our data and constantly challenge the status quo. With
additional experience and exposure to advanced technical projects, they are capable of becoming a Tech Lead within 2 years.
Basic Qualifications
About the role
You’ll be working as an analyst on our observation management team, responsible for ensuring the scalability of the data sources used for
presenting actionable detections to our Security Services teams and customers.
Some of your day-to-day responsibilities will be:
Optimize data retention and storage to minimize costs while maintaining security efficacy.
Build and improve processes for determining data value with input from cross-functional teams.
Research and develop expertise in the various threat surfaces and telemetry available for them.
Developing and maintaining Python and YAML-based pattern matches, software, and systems.
Work with team members to develop novel reductions and continuously tune existing ones.
Build runbooks, reports and supporting material for detection surfaces.
Writing clean, efficient, and reusable code in Python.
Conducting code and configuration reviews and providing constructive feedback to ensure quality and maintainability.
Optimizing application performance and ensuring scalability.
Understand the product and how Security Services delivers the service.
Develop professional expertise, apply company policies and procedures to resolve a variety of issues. Determine a course of action
based on guidelines, and modify processes and methods as required.
We value a culture of sharing, so every team has the opportunity to share their work with the entire department during our monthly R&D
Demos. Once a year we hold a department-wide Hackathon, teaming up across all R&D teams over four days to collaborate and build cool
ideas outside the normal project scope. While innovation is the focus, some of these ideas do make it into our products.
About you
You’re a talented technical analyst who loves paying attention to detail and cares deeply about process quality and reliability while
optimizing performance. You enjoy coordinating with distributed cross-functional teams. You are constantly adapting to emerging
5 or more years of professional experience as a Software Developer or equivalent role
Experience consists of projects contributing in either Python or YAML
Experience one or more of the following:
Familiarity with Snort/Suricata rules
Familiarity with understanding Network signatures/detections
Familiarity with IDS/IPS, Proxy, Firewall, SSE, VPN, and other network-related products and vendors
Familiarity with premises Active Directory architecture, including domains, trusts, Organizational Units (OUs), and Group Policy
Objects (GPOs).
Understanding of AD telemetry, including event logs, monitoring, and analysis.
Professional certifications in Security and/or Networking are desired (e.g. CISSP, GNFA, GCFA, GCFE, GREM).
Nice to have: A clear history of technical influence (public conference talks, papers, etc)
Nice to have: Experiencing working in a Security Operations Center (SOC) or development experience supporting a SOC.
Nice to have: A clear history of learning and skills development. Regularly helps developers develop their skills in a variety of ways.
Nice to have: B.Sc. in Computer Sciencetechnologies, trends, and best practices. You will build productive internal/external working relationships to resolve mutual problems by
collaborating on procedures or transactions, with a focus on providing standard professional advice and creating initial reports/analyses for
review by experienced team professionals.
Here are some of the core technologies we use and teach across our detections teams:
YAML
Git
Kibana
Python
Sigma
Suricata
Wazuh
You are not required to be an expert in any of these, but you should be excited by the opportunity to learn new things and comfortable with
coming up to speed quickly. Any experience with detection development or full-stack development frameworks and practices is relevant and
transferrable.
Interview Process
The interview process is approximately as follows:
Phone pre-screening: A recruiter contacts you to briefly discuss your work history and provide an overview of Arctic Wolf. Approximately
30 minutes.
Face-to-face interviews: Several team members conduct three interviews to learn more about you and provide more information about
your potential role and team. This interview will touch on past projects and your career goals. Approximately 1 hour total.
Technical assessment: A recruiter sends you a link to a straightforward technical assessment that is relevant to the role you are
applying for. Approximately 1 hour.
Technical breadth interview: Meeting with some technical team members to evaluate the knowledge of our tech stack and experience
in other associated, complementary, or substitute technologies. Be prepared to collaborate on a technical problem . Approximately 1.5
hours.
Technical depth interview: Meeting with some technical team members to review the technical assessment done. Be prepared to
collaborate on a technical problem . Approximately 1.5 hours.
External influence and Training Role Objective
Be seen as a technical thought leader both internally and externally. Participate and lead internal knowledge sharing workshops,
contribute to external publications, lead public events relevant to job role.
Attend training, seminars or webinars relevant to job role to enhance current knowledge base and skill set in order to improve job
performance and efficiency. Attend at least one event a year. The training should not impact job/project deliverables.
Security Requirements
Conducts duties and responsibilities in accordance with AWN’s Information Security policies, standards, processes and controls to
protect the confidentiality, integrity and availability of AWN business information.
Must pass a criminal background check and an employment verification as a condition of employmen
They are able to manage competing priorities as they relate to improving the value of our data and constantly challenge the status quo. With
additional experience and exposure to advanced technical projects, they are capable of becoming a Tech Lead within 2 years.
Basic Qualifications
About the role
You’ll be working as an analyst on our observation management team, responsible for ensuring the scalability of the data sources used for
presenting actionable detections to our Security Services teams and customers.
Some of your day-to-day responsibilities will be:
Optimize data retention and storage to minimize costs while maintaining security efficacy.
Build and improve processes for determining data value with input from cross-functional teams.
Research and develop expertise in the various threat surfaces and telemetry available for them.
Developing and maintaining Python and YAML-based pattern matches, software, and systems.
Work with team members to develop novel reductions and continuously tune existing ones.
Build runbooks, reports and supporting material for detection surfaces.
Writing clean, efficient, and reusable code in Python.
Conducting code and configuration reviews and providing constructive feedback to ensure quality and maintainability.
Optimizing application performance and ensuring scalability.
Understand the product and how Security Services delivers the service.
Develop professional expertise, apply company policies and procedures to resolve a variety of issues. Determine a course of action
based on guidelines, and modify processes and methods as required.
We value a culture of sharing, so every team has the opportunity to share their work with the entire department during our monthly R&D
Demos. Once a year we hold a department-wide Hackathon, teaming up across all R&D teams over four days to collaborate and build cool
ideas outside the normal project scope. While innovation is the focus, some of these ideas do make it into our products.
About you
You’re a talented technical analyst who loves paying attention to detail and cares deeply about process quality and reliability while
optimizing performance. You enjoy coordinating with distributed cross-functional teams. You are constantly adapting to emerging
5 or more years of professional experience as a Software Developer or equivalent role
Experience consists of projects contributing in either Python or YAML
Experience one or more of the following:
Familiarity with Snort/Suricata rules
Familiarity with understanding Network signatures/detections
Familiarity with IDS/IPS, Proxy, Firewall, SSE, VPN, and other network-related products and vendors
Familiarity with premises Active Directory architecture, including domains, trusts, Organizational Units (OUs), and Group Policy
Objects (GPOs).
Understanding of AD telemetry, including event logs, monitoring, and analysis.
Professional certifications in Security and/or Networking are desired (e.g. CISSP, GNFA, GCFA, GCFE, GREM).
Nice to have: A clear history of technical influence (public conference talks, papers, etc)
Nice to have: Experiencing working in a Security Operations Center (SOC) or development experience supporting a SOC.
Nice to have: A clear history of learning and skills development. Regularly helps developers develop their skills in a variety of ways.
Nice to have: B.Sc. in Computer Sciencetechnologies, trends, and best practices. You will build productive internal/external working relationships to resolve mutual problems by
collaborating on procedures or transactions, with a focus on providing standard professional advice and creating initial reports/analyses for
review by experienced team professionals.
Here are some of the core technologies we use and teach across our detections teams:
YAML
Git
Kibana
Python
Sigma
Suricata
Wazuh
You are not required to be an expert in any of these, but you should be excited by the opportunity to learn new things and comfortable with
coming up to speed quickly. Any experience with detection development or full-stack development frameworks and practices is relevant and
transferrable.
Interview Process
The interview process is approximately as follows:
Phone pre-screening: A recruiter contacts you to briefly discuss your work history and provide an overview of Arctic Wolf. Approximately
30 minutes.
Face-to-face interviews: Several team members conduct three interviews to learn more about you and provide more information about
your potential role and team. This interview will touch on past projects and your career goals. Approximately 1 hour total.
Technical assessment: A recruiter sends you a link to a straightforward technical assessment that is relevant to the role you are
applying for. Approximately 1 hour.
Technical breadth interview: Meeting with some technical team members to evaluate the knowledge of our tech stack and experience
in other associated, complementary, or substitute technologies. Be prepared to collaborate on a technical problem . Approximately 1.5
hours.
Technical depth interview: Meeting with some technical team members to review the technical assessment done. Be prepared to
collaborate on a technical problem . Approximately 1.5 hours.
External influence and Training Role Objective
Be seen as a technical thought leader both internally and externally. Participate and lead internal knowledge sharing workshops,
contribute to external publications, lead public events relevant to job role.
Attend training, seminars or webinars relevant to job role to enhance current knowledge base and skill set in order to improve job
performance and efficiency. Attend at least one event a year. The training should not impact job/project deliverables.
Security Requirements
Conducts duties and responsibilities in accordance with AWN’s Information Security policies, standards, processes and controls to
protect the confidentiality, integrity and availability of AWN business information.
Must pass a criminal background check and an employment verification as a condition of employmen
Confirm your E-mail: Send Email
All Jobs from Arctic Wolf Networks