Job Description
This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.
Role Description
CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.
- This is a 3rd Shift Role (11pm-10am).
- Exercise incident handling processes across Windows, Mac, and Linux platforms.
- Perform basic malware analysis.
- Develop and improve processes for incident detection and the execution of countermeasures.
- Produce high-quality written and verbal communications, recommendations, and findings to customer management.
- Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
- Qualifications
- Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
- Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
- Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
- Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
- Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
- Programming/Scripting: experience coding in C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
- Capable of completing technical tasks without supervision.
- Desire to grow and expand both technical and soft skills.
- Strong project management skills.
- Contributing thought leader within the incident response industry.
- Ability to foster a positive work environment and attitude.
- Requirements
- Must be willing to work 4x10 schedule, including a day on the weekend.
- This role is only open to US citizens and Green Card holders.
- This is a 3rd Shift role, 11pm-10am.
- Education
- BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.
- Applicants without a degree but with relevant work experience and/or training will be considered.
- Benefits
- Market leader in compensation and equity awards.
- Comprehensive physical and mental wellness programs.
- Competitive vacation and holidays for recharge.
- Paid parental and adoption leaves.
- Professional development opportunities for all employees regardless of level or role.
- Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
- Vibrant office culture with world class amenities.
- Great Place to Work Certified™ across the globe.
Apply Now
Apply Now