Senior Developer - Detection

Bengaluru, India

Arctic Wolf

Arctic Wolf delivers dynamic, 24x7 AI-driven cybersecurity protection tailored to the needs of your organization. Ready to boost your cyber resilience?

View all jobs at Arctic Wolf

Apply now Apply later

Senior Detection Developer, Active Directory

A Detection Developer has a clear history of successful contribution to professional detection development projects. They are driven, curious, and results oriented. They are able to manage competing priorities as they relate to improving existing our existing codebase of detections and constantly challenge the status quo. With additional experience and exposure to advanced detection development patterns and projects, they are capable of becoming a Technical Lead within 2 years.

Basic Qualifications

  • 4 or more years of professional experience as a Detection Developer

  • Strong understanding of AD telemetry, including event logs, monitoring, and analysis.

  • In-depth knowledge of on-premises Active Directory architecture, including domains, trusts, Organizational Units (OUs), and Group Policy Objects (GPOs).

  • Proficient in analyzing Active Directory telemetry, such as security event logs, replication data, and user activity monitoring.

  • Strong analytical skills to detect anomalies and potential security incidents within on-premises AD environments.

  • Experience with Active Directory Federation Services (ADFS) for identity federation and single sign-on (SSO) solutions.

  • Proficient in investigating Pass-Through Authentication (PTA) for secure user authentication in hybrid environments.

  • Proven experience developing and implementing detection strategies for on-premises Active Directory threats, such as privilege escalation, Kerberos ticket manipulation, and unauthorized access.

  • Familiarity with common attack vectors targeting on-premises AD, including lateral movement techniques and credential dumping.

  • Professional certifications in Security and/or Cloud are required (i.e. CISSP, GNFA, GCFA, GCFE, GREM).

  • Experience consists of leading a team of 3 or more Detection Developers while contributing code independently

  • Nice to have: Experience leading Agile development teams, preferably with formal Agile training

  • Nice to have: A clear history of technical influence (public conference talks, papers, etc)

  • Nice to have: A clear history of learning and skills development. Regularly helps detection developers develop their skills in a variety of ways.

  • Nice to have: B.Sc. in Computer Science

About the role

You’ll be working as a detection developer on our Identity Team, responsible for ensuring quality and scale of our detection base and presenting actionable detections to our Security Services teams and customers.

Some of your day-to-day responsibilities will be:

  • Developing and maintaining Python and YAML-based detections, software, and systems.

  • Research and develop expertise in the various threat surfaces and telemetry available for them

  • Propose coverage and efficacy improvements to the detection surface

  • Work with team members to develop novel detections and continuously tune existing ones

  • Build runbooks, reports and supporting material for detection surfaces

  • Collaborating with cross-functional teams to gather requirements and implement detections.

  • Writing clean, efficient, and reusable code in Python.

  • Conducting code reviews and providing constructive feedback to ensure code quality and maintainability.

  • Debugging and fixing issues in existing Python codebases.

  • Optimizing application performance and ensuring scalability.

  • Participate in the full software development life cycle, building well-designed, testable, efficient, secure code.

  • Understand the product and how Security Services delivers the service.

  • Develop professional expertise, apply company policies and procedures to resolve a variety of issues. Determine a course of action based on guidelines, and modify processes and methods as required.

  • Continuously learning and adopting best practices for code quality, software development methodologies, and programming principles to enhance coding skills and stay updated with industry advancements.

We value a culture of sharing, so every team has the opportunity to share their work with the entire department during our monthly R&D Demos. Once a year we hold a department-wide Hackathon, teaming up across all R&D teams over four days to collaborate and build cool ideas outside the normal project scope. While innovation is the focus, some of these ideas do make it into our products.

About you

You’re a talented detection developer who loves building things and cares deeply about code quality and reliability while optimizing performance. You enjoy coordinating with distributed cross-functional teams. You are constantly adapting to emerging technologies, trends, and best practices. You will build productive internal/external working relationships to resolve mutual problems by collaborating on procedures or transactions, with a focus on providing standard professional advice and creating initial reports/analyses for review by experienced team professionals.

Here are some of the core technologies we use and teach across our detections teams:

  • Python

  • Sigma

  • Suricata

  • Wazuh

  • Kibana

  • Git

You are not required to be an expert in any of these, but you should be excited by the opportunity to learn new things and comfortable with coming up to speed quickly. Any experience with detection development or full-stack development frameworks and practices is relevant and transferrable.

Interview Process

The interview process is approximately as follows:

  • Phone pre-screening: A recruiter contacts you to briefly discuss your work history and provide an overview of Arctic Wolf. Approximately 30 minutes.

  • Face-to-face interviews: Several team members conduct three interviews to learn more about you and provide more information about your potential role and team. This interview will touch on past projects and your career goals. Approximately 1 hour total.

  • Technical assessment: A recruiter sends you a link to a straightforward technical assessment that is relevant to the role you are applying for. Approximately 1 hour.

  • Technical breadth interview: Meeting with some technical team members to evaluate the knowledge of our tech stack and experience in other associated, complementary, or substitute technologies. Be prepared to collaborate on a technical problem . Approximately 1.5 hours.

  • Technical depth interview: Meeting with some technical team members to review the technical assessment done. Be prepared to collaborate on a technical problem . Approximately 1.5 hours.

External influence and Training Role Objective

  • Be seen as a technical thought leader both internally and externally. Participate and lead internal knowledge sharing workshops, contribute to external publications, lead public events relevant to job role.

  • Attend training, seminars or webinars relevant to job role to enhance current knowledge base and skill set in order to improve job performance and efficiency. Attend at least one event a year. The training should not impact job/project deliverables.

Security Requirements

  • Conducts duties and responsibilities in accordance with AWN’s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information.

  • Must pass a criminal background check and an employment verification as a condition of employment.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Active Directory Agile CISSP Cloud Computer Science Full stack GCFA GCFE GNFA GREM Kerberos Monitoring Python R&D SDLC SSO

Perks/benefits: Career development Team events

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.