Threat Intelligence Researcher-Automated Detection

Not Interested
Bookmark
Report This Job

profile Job Location:

Bengaluru - India

profile Monthly Salary: Not Disclosed
Posted on: 30+ days ago
Vacancies: 1 Vacancy

Job Summary

About the job

At Arctic Wolf were not just navigating the cybersecurity landscape - were redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: weve earned recognition on theForbes Cloud 100 CNBC Disruptor 50 Fortune Future 50 and Fortune Cyber 60lists and we recently took home the2024 CRN Products of the Yearaward. Were proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRNs Products of the Year award in the inaugural Security Operations Platform category. Join a company thats not only leading but also shaping the future of security operations.

Our mission is simple: End Cyber Risk. Were looking for a Threat Intelligence Researcher Automated Detection to be part of making that happen.

About the Role

The Detection Automation team is responsible for a detection automation pipeline to translate detection candidates from Threat Intelligence Security and Detection researchers into detection artifacts that ensure a timely release to our Security Services teams. As a detection researcher on our Detection Automation team you will be responsible for researching & authoring detections in an automated flow identifying opportunities to improve the automated detection flows and enabling detection researchers from across the organization to author automated detections. The detection automation team ensures quality and scale of our automated detection base and presents actionable detections to our Security Services teams and customers.

Arctic Wolf Labs is the research-focused division at Arctic Wolf focused on advancing innovation in the field of security operations. The mission of Arctic Wolf Labs is to develop cutting-edge technology and tools that are designed to enhance the companys core mission to end cyber risk while also bringing comprehensive security intelligence to Arctic Wolfs customer base and the security community-at-large. Leveraging the more than two trillion security events the Arctic Wolf Security Operations Cloud ingests parses enriches and analyzes each week Arctic Wolf Labs is responsible for performing threat research on new and emerging adversaries developing advanced threat detection models and driving improvement in the speed scale and detection abilities of Arctic Wolfs solution offerings. The Arctic Wolf Labs team comprises security and threat intelligence researchers data scientists security development engineers with deep domain knowledge in artificial intelligence (AI) security R&D as well as advanced threat offensive and defensive methods and technologies. Security Research Services Development partners with these groups to understand requirements design & implement scalable fault-tolerant solutions and build the next generation of security capabilities for Arctic Wolf.

Responsibilities Include:

Develop and maintain SQL Python and YAML-based detections-as-code

Research and develop expertise in the various threat surfaces and telemetry available for them

Propose coverage and efficacy improvements to the detection surface

Work with team members to develop novel detections and continuously tune existing ones

Build runbooks reports and supporting material for detection surfaces

Collaborating with cross-functional teams to gather requirements and implement detections.

Write clean efficient and reusable script in Python bash or macro.

Conduct code reviews and provide constructive feedback to ensure code quality and maintainability.

Debug and fix issues in existing Python codebases.

Optimize application and query performance to ensure scalability.

Understand the product and how Security Services delivers the service.

Develop professional expertise apply company policies and procedures to resolve a variety of issues. Determine a course of action based on guidelines and modify processes and methods as required.

Continuously learn and adopt best practices for detections-as-code code quality software development methodologies and programming principles to enhance coding skills and stay updated with industry advancements.

Capable of malware analysis and families and emerging threats using established methodologies.

Support ongoing tracking of threat actors and campaigns.

Expert Positioning Goal:

o Present at 1 local cybersecurity meetup brown bag or internal R&D showcase per year.

Example Key Results:

o Authored 5 YARA/Sigma rules with >95% accuracy validated in QA.

o Delivered internal briefing on malware behavior observed in a recent campaign.

o Contributed technical write-ups used in 2 customer intelligence summaries.

About You

Youre a talented threat intelligence researcher / detection developer loves building things and cares deeply about code quality and reliability while optimizing performance. You enjoy coordinating with distributed cross-functional teams. You are constantly adapting to emerging technologies trends and best practices. You will build productive internal/external working relationships to resolve mutual problems by collaborating on procedures or transactions with a focus on providing standard professional advice and creating initial reports/analyses for review by experienced team professionals.

Here are some of the core technologies we use and teach across our detection teams:

  • Python
  • Yara
  • SQL
  • Sigma
  • Suricata
  • Wazuh
  • Kibana
  • Git

You are not required to be an expert in any of these but you should be excited by the opportunity to learn new things and comfortable with coming up to speed quickly. Any experience with detection development or full-stack development frameworks and practices is relevant and transferrable.

WERE LOOKING FOR SOMEONE WITH:

  • 2 or more years of professional experience as a Threat Intelligence Researcher / Detection Developer
  • Experience consists of projects contributing in either Python or YAML
  • OS Specific Telemetry (Windows Security/Sysmon logs Linux)
  • Expertise in Windows PowerShell Monitoring
  • Understanding of the authoring lifecycle of SIEM Detections and Detection artifacts
    • EDRdetections/signatures
    • Sigma and Yara Rules
    • Streaming and batch-based detections
    • Threat hunting & detection research
    • Development of anomaly and behavioral based detections
  • Demonstrated experience authoring and enabling Detections-as-Code
  • Experience tuning and optimization of detections for all the above
  • Experience consists of working in a team of 2 or more Detection Developers while contributing code independently
  • Nice to have:
    • A clear history of technical influence (public conference talks papers etc)
    • Professional certifications in Security and/or Cloud (i.e. CISSP GNFA GCFA GCFE GREM).
    • Experience working in Agile development teams preferably with formal Agile training
    • A clear history of learning and skills development. Regularly helps detection developers develop their skills in a variety of ways.
    • Bachelors in computer science with exposure in cyber security

At Arctic Wolf we foster a collaborative and inclusive work environment that thrives on diversity of thought background and culture. This is reflected in our multiple awards including Top Workplace USA (2021-2024) Best Places to Work USA (2021-2024) Great Place to Work Canada (2021-2024) Great Place to Work UK (2024) and Kununu Top Company Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction with over 7000 customers worldwide and more than 2000 channel partners globally. As we continue to expand globally and enhance our technology Arctic Wolf remains the most trusted name in the industry.

Our Values

Arctic Wolf recognizes that success comes from delighting our customers so we work together to ensure that happens every day. We believe in diversity and inclusionand truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate thatby protecting peoples and organizations sensitive data and seeking to end cyber risk we get to work in an industry that is fundamental to the greater good.

We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here.

We also believe and practice corporate responsibility and have recently joined the Pledge 1% Movement ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities.

All wolves receive compelling compensation and benefits packages including:

Equity for all employees

Flexible annual leave paid holidays and volunteer days

Training and career development programs

Comprehensive private benefits plan including medical insurance for you and your family life insurance (3x compensation) and personal accident insurance.

Fertility support and paid parental leave

Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race color religion sex orientation national origin age disability genetics or any other basis forbidden under federal provincial or local law. Arctic Wolf is committed to fostering a welcoming accessible respectful and inclusive environment ensuring equal access and participation for people with disabilities. As such we strive to make our entireemployeeexperience as accessible as possible and provideaccommodationsas required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing

On-Camera Policy
To support a fair transparent and engaging interview experience candidates interviewing remotely are expected to be on camera during all video interviews.
Being on camera fosters authentic connection improves communication and allows for full engagement from both candidates and interviewers.
We understand that technical bandwidth or location-related challenges may occasionally prevent video use. If this applies candidates are required to notify us in advance so we can explore appropriate accommodations.

Security Requirements

Conducts duties and responsibilities in accordance with AWNs Information Security policies standards processes and controls to protect the confidentiality integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies).
Background checks are required for this position.
This position may require access to information protected under U.S. export control laws and regulations including the Export Administration Regulations (EAR). Please note that if applicable an offer for employment will be conditioned on authorization to receive software or technology controlled under these laws and regulations.

About the jobAt Arctic Wolf were not just navigating the cybersecurity landscape - were redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: weve earned recognition on theForbes Cloud 100 CNBC Disru...
View more view more

Key Skills

  • Intelligence Community Experience
  • Python
  • Spss
  • Microsoft Word
  • R
  • Regression Analysis
  • Windows
  • Stata
  • Microsoft Powerpoint
  • Research Experience
  • Data Modeling
  • Writing Skills

About Company

Company Logo

Arctic Wolf delivers dynamic, 24x7 AI-driven cybersecurity protection tailored to the needs of your organization. Ready to boost your cyber resilience?

View Profile View Profile