diff --git a/detect_secrets/plugins/softlayer.py b/detect_secrets/plugins/softlayer.py
index b35a873b6..e0277d9da 100644
--- a/detect_secrets/plugins/softlayer.py
+++ b/detect_secrets/plugins/softlayer.py
@@ -8,7 +8,7 @@
 from detect_secrets.core.constants import VerifiedResult
 
 
-class SoftLayerDetector(RegexBasedDetector):
+class SoftlayerDetector(RegexBasedDetector):
     """Scans for Softlayer credentials."""
 
     secret_type = 'SoftLayer Credentials'
@@ -48,7 +48,7 @@ def find_username(content):
     username = r'(\w(?:\w|_|@|\.|-)+)'
     regex = re.compile(
         RegexBasedDetector.assign_regex_generator(
-            prefix_regex=SoftLayerDetector.sl,
+            prefix_regex=SoftlayerDetector.sl,
             password_keyword_regex=username_keyword,
             password_regex=username,
         ),
diff --git a/tests/plugins/softlayer_test.py b/tests/plugins/softlayer_test.py
index 59a116f5a..92f1dc575 100644
--- a/tests/plugins/softlayer_test.py
+++ b/tests/plugins/softlayer_test.py
@@ -7,13 +7,13 @@
 
 from detect_secrets.core.constants import VerifiedResult
 from detect_secrets.plugins.softlayer import find_username
-from detect_secrets.plugins.softlayer import SoftLayerDetector
+from detect_secrets.plugins.softlayer import SoftlayerDetector
 
 SL_USERNAME = 'test@testy.test'
 SL_TOKEN = 'abcd1234abcd1234abcd1234abcd1234abcd1234abcd1234abcd1234abcd1234'
 
 
-class TestSoftLayerDetector(object):
+class TestSoftlayerDetector(object):
 
     @pytest.mark.parametrize(
         'payload, should_flag',
@@ -78,7 +78,7 @@ class TestSoftLayerDetector(object):
         ],
     )
     def test_analyze_string(self, payload, should_flag):
-        logic = SoftLayerDetector()
+        logic = SoftlayerDetector()
 
         output = logic.analyze_string(payload, 1, 'mock_filename')
         assert len(output) == (1 if should_flag else 0)
@@ -90,7 +90,7 @@ def test_verify_invalid_secret(self):
             json={'error': 'Access denied. '}, status=401,
         )
 
-        assert SoftLayerDetector().verify(
+        assert SoftlayerDetector().verify(
             SL_TOKEN,
             'softlayer_username={}'.format(SL_USERNAME),
         ) == VerifiedResult.VERIFIED_FALSE
@@ -101,20 +101,20 @@ def test_verify_valid_secret(self):
             responses.GET, 'https://api.softlayer.com/rest/v3/SoftLayer_Account.json',
             json={'id': 1}, status=200,
         )
-        assert SoftLayerDetector().verify(
+        assert SoftlayerDetector().verify(
             SL_TOKEN,
             'softlayer_username={}'.format(SL_USERNAME),
         ) == VerifiedResult.VERIFIED_TRUE
 
     @responses.activate
     def test_verify_unverified_secret(self):
-        assert SoftLayerDetector().verify(
+        assert SoftlayerDetector().verify(
             SL_TOKEN,
             'softlayer_username={}'.format(SL_USERNAME),
         ) == VerifiedResult.UNVERIFIED
 
     def test_verify_no_secret(self):
-        assert SoftLayerDetector().verify(
+        assert SoftlayerDetector().verify(
             SL_TOKEN,
             'no_un={}'.format(SL_USERNAME),
         ) == VerifiedResult.UNVERIFIED