Suricata Community Council

One of the most valuable moments in the Suricata development process is the annual SuriCon brainstorm. This interaction between the team and community gives the development team a lot of input for the coming year. The Suricata Community Council has been formed (July 2018) to create similar interactions more frequently. The goal of this council is to foster ongoing, open, two-way communication between the Suricata community and the development team.

To avoid scaling issues, the council’s size is being limited to invited contributors and other community members. Platinum and Gold levels of the OISF consortium will each get a representative in the council as well.

Members of the Suricata Community Council will:

  • Provide technical advice and feedback to the development team for major releases;
  • Report on the general state of the Suricata community;
  • Participate in quarterly calls;
  • Attend SuriCon annually.

The council will be lead by Victor Julien with back-up and support from other members of the OISF team.  It will meet quarterly via conference call and annually in person at SuriCon.  Minutes and updates from these meetings will be posted here.  

Community Council Members:

Cooper Nelson: Cooper is an authority in content delivery, high-performance computing and computer security. He has over twenty years experience working in the public and private R&D sector, including AT&T Bell Laboratories, AT&T Research, CERFNET, startups, SDSC and the Scripps Institute of Oceanography. He has spent the last 14 years as the technical lead for UCSD IR initiatives and the campus SOC.

Danny Browning: Danny is a platform engineer at Protectwise, where he is involved in capturing packets, shipping them to the cloud, and attempting to process them effectively and efficiently. Those efforts led him to work with Suricata at a large scale, occasionally contributing back to the project. Danny has spent most of his career working on high performant and distributed systems, in languages ranging from Fortran to Scala, and currently spends most of his time finding ways to do more development in Rust both at Protectwise and in Suricata.

David Wharton: David is a senior security researcher with the Secureworks Counter Threat Unit where he leads network countermeasure development. Currently he researches the latest vulnerabilities and threats, and crafts, tests, refines, and deploys network IPS rules for thousands of managed and monitored devices to protect myriad clients across diverse industries. He has 20 years experience in the IT industry, including more than 12 years writing and applying IDS/IPS rules for a variety of platforms. A big supporter and user of Suricata from its inception, David is excited by its past success, current community, and bright future. He holds a B.S. in Computer Science and a M.S. in Information Security from Georgia Tech.

Doug Burks: Doug started Security Onion in 2008 to provide a comprehensive platform for intrusion detection, network security monitoring, and log management. Today, Security Onion has over 600,000 downloads and is being used by organizations around the world to help monitor and defend their networks. In 2014, Doug started Security Onion Solutions LLC to help those organizations by providing commercial support and training. Doug is a CEO, public speaker, teacher, former president of the Greater Augusta ISSA, and co-founder of BSides Augusta, but what he really likes the most is catching bad guys.

Jason Taylor: Jason is currently working as a threat analyst in the auto industry. In a previous life worked as a linux engineer for a variety of different industries. Currently also a package maintainer for the Fedora Project for a handful of packages. In my spare time I enjoy being a horrible white belt in bjj.

Jos Schellevis: Jos likes to describe himself as a creative thinker, entrepreneur, and engineer at heart with a passion for open source. As Chief Technology Officer at Deciso B.V. and core member of the OPNsense community project, he is a technology enthusiast and innovator. In his spare time Jos enjoys cooking, a good glass of wine, and watching detectives. He graduated from Rotterdam University of Applied Technology and has over 20 years of experience in networking and telecommunications.

Mats Klepsland: Mats spends his days developing solutions to detect attacks against national critical infrastructure. He writes software and leads the development team at the Norwegian CERT (NorCERT). He tries to spend as much time as possible contributing to open source software. Mats especially enjoys contributing to Suricata, where he is the maintainer for SSL/TLS, and where he otherwise tries to help out by contributing patches to various parts of the codebase. 

Michal Purzynski: Michal leads the Threat Management and Incident Response at Mozilla. His team hunts threat actors and helps to protect hundreds of millions of Firefox users. He designed and created managed security services on a datacenter scale, and moved to Mozilla to continue making bad guys life’s miserable. He built the Network Security program, including the Network Security Monitoring system spanning three continents, eight countries, and a cloud. Michal publishes the code for the Bro IDS, spins Suricata above and beyond 40Gbit/sec and makes sure Mozilla has means to detect attacks and respond to them with a “they didn’t even know what hit them” efficiency. He continued sharing his knowledge at various conferences, such as SuriCon and BroCon. Michal is also a member of the Bro IDS Board of Directors.

Pierre Chifflier: Pierre is interested in various security topics such as Operating Systems, boot sequence, compilers and languages, and new intrusion detection methods. He’s also trying to link all these topics by improving detection tools, writing safe parsers and deploying tools in a secure architecture. He is also a Debian Developer and has been involved in Free Software for a long time.

Randy Caldejon: As co-founder and CEO, Randy leads CounterflowAI’s vision, innovation, and execution. He is a widely-respected authority in network security monitoring and an active supporter of the Suricata project since the beginning. In his spare time, Randy enjoys biking, fly fishing, and instrumenting his farm with IoT sensors. He holds a BS in Computer Science from University of Maryland Baltimore County (UMBC) and a MEng in Computer and Systems Engineering from Rensselaer Polytechnic Institute (RPI).

Sascha Steinbiss: Sascha has a background in bioinformatics, efficient string algorithms and genome annotation. Having been involved in open-source software development for over a decade, he now helps build and run a large multi-customer network security monitoring infrastructure based on Suricata. Sascha is also a Debian Developer and occasional contributor to the Debian packaging effort for Suricata and its ecosystem.

For questions about the Suricata Community Council or becoming an OISF consortium member, please contact us at info@oisf.net.

Code of Conduct: The Suricata Community Council is dedicated to providing a community-centric, safe and harassment-free environment experience for everyone, regardless and not limited to, of gender, sexual orientation, disability, physical appearance, body size, race or religion. Members of this council will hold a visible role in the OISF and Suricata communities therefore are expected to behave in a respectful manner. We do not tolerate harassment of members or participants of this council or the community in any form – in person, on calls, social media, etc. Unacceptable behavior can result in participants being immediately removed from the council.