David Wolf · Portfolio Use Case
A public security research program turning SIEM deployment analysis, cloud detection patterns, architecture innovation, and SOC maturity findings into RSA, Infosecurity Europe, and CloudNativeSecurityCon-ready narratives.
Developed and contributed to Devo security research that converted customer deployment analysis, SIEM maturity patterns, detection taxonomy work, cloud-native security findings, and architecture innovation into conference-grade research accepted at major industry venues including RSA, Infosecurity Europe, and CloudNativeSecurityCon.

Client
Devo
Engagement Type
Full-Time security research and architecture innovation role
Period
2022–2023
Role
Security Research Engineer - Architecture Innovation
Focus Areas
Security Research, Conference Speaking, RSA Conference Research
The Context
Security research inside a cloud SIEM company is most useful when it reflects real deployment patterns. Devo's customer and MSSP environments provided a practical window into SOC maturity, cloud detection growth, taxonomy gaps, and architecture debt.
The Challenge
The challenge was extracting public research from private operational reality. The work needed to identify patterns without exposing customers, and it needed to be useful to practitioners rather than sounding like product marketing.
What I Did
The Outcome
The program showed how architecture work, customer deployment analysis, and detection engineering can become credible public security research. It strengthened David's position as a security researcher who can convert messy SOC reality into useful market-facing insight.
Resume
Source describes analysis of 300 enterprise and MSSP SIEM deployments and research accepted at RSA and industry conferences
CloudNativeSecurityCon
Listings identify related Devo research by David Wolf and Joshua Smith analyzing 2,000 enterprise cloud detections
Themes
Included SIEM reference architecture, detection taxonomy, Devo Exchange validation, cloud-native detections, SOC maturity, and cloud security operations
Key Deliverables
Collaboration
Worked across Devo architecture innovation, security research, detection engineering, product, customer-facing, and public conference contexts to turn real deployment patterns into security research and market education.
Client
Devo
Engagement Type
Full-Time security research and architecture innovation role
Period
2022–2023
Role
Security Research Engineer - Architecture Innovation
Focus Areas
Security Research, Conference Speaking, RSA Conference Research
The Context
Security research inside a cloud SIEM company is most useful when it reflects real deployment patterns. Devo's customer and MSSP environments provided a practical window into SOC maturity, cloud detection growth, taxonomy gaps, and architecture debt.
The Challenge
The challenge was extracting public research from private operational reality. The work needed to identify patterns without exposing customers, and it needed to be useful to practitioners rather than sounding like product marketing.
What I Did
The Outcome
The program showed how architecture work, customer deployment analysis, and detection engineering can become credible public security research. It strengthened David's position as a security researcher who can convert messy SOC reality into useful market-facing insight.
Resume
Source describes analysis of 300 enterprise and MSSP SIEM deployments and research accepted at RSA and industry conferences
CloudNativeSecurityCon
Listings identify related Devo research by David Wolf and Joshua Smith analyzing 2,000 enterprise cloud detections
Themes
Included SIEM reference architecture, detection taxonomy, Devo Exchange validation, cloud-native detections, SOC maturity, and cloud security operations
Key Deliverables
Collaboration
Worked across Devo architecture innovation, security research, detection engineering, product, customer-facing, and public conference contexts to turn real deployment patterns into security research and market education.
At a Glance
Focus Areas
Tools & Technologies
Evidence & Artifacts
Public-Safe Caveat
This case study uses uploaded resume/Profile source material and conservative public-safe language. Exact customer names, private deployment details, proprietary research data, internal dashboards, conference submission drafts, and non-public artifacts are omitted unless later confirmed and approved for public use.
David Wolf
AI Security · Product Security · Security Leadership
Based on analyzed public signals, not proof of any individual's or company's internal state.