Job Description
Position: CrowdStrike Next-Gen SIEM Associate Consultant (Remote) Crowd Strike, Inc. Full time R26940 As a global leader in cybersecurity, Crowd Strike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed β we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on Crowd Strike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every Crowd Striker both the flexibility and autonomy to own their careers. We're always looking to add talented Crowd Strikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: The Next-Gen SIEM Associate Resident Consultant is an embedded technical advisor who partners closely with strategic customers to maximize the value of their Crowd Strike Next-Gen SIEM investment. This role combines technical expertise with strategic consulting to drive successful Next-Gen SIEM adoption, optimization, and ongoing operational excellence. The associate resident consultant is responsible for the planning, deployment, implementation, and operational support of the customer's Next-Gen SIEM environment. What You'll Do: Customer Partnership & Strategy β’ Serve as the primary technical advisor for assigned strategic customer accounts β’ Develop and maintain trusted advisor relationships with customer security teams and leadership β’ Understand customer security operations workflows, use cases, and business objectives β’ Mentor customer teams on SIEM best practices and threat hunting techniques Technical Implementation & Optimization β’ Guide customers through Next-Gen SIEM deployment, configuration, and integration β’ Optimize data ingestion strategies and log source configurations β’ Design and implement custom detection rules, correlation searches, and use cases β’ Develop dashboards, reports, and visualizations tailored to customer requirements β’ Assist with migration of detection content from legacy SIEM platforms (Splunk, QRadar, etc.) β’ Perform health checks and platform optimization reviews β’ Troubleshoot complex technical issues and coordinate with engineering teams as needed β’ Track and report on key performance indicators and success metrics Identify opportunities for automation and workflow improvements β’ Contribute to internal knowledge base and best practices documentation What You'll Need: Technical Skills β’ 2+ years of experience in security operations, SIEM administration, or security engineering β’ Familiarity with at least one major SIEM platform (Next-Gen SIEM, Log Scale, Splunk, QRadar, Sentinel, Chronicle, etc.) β’ Understanding of query languages (SQL, SPL, KQL, CQL, or similar) β’ Experience with detection engineering and correlation rule development β’ Knowledge of common log sources (Windows, Linux, network devices, cloud platforms) β’ Familiarity with scripting/automation (Python, Power Shell, Bash) β’ Understanding of cloud security (AWS, Azure, GCP, OCI) β’ Familiarity with endpoint detection and response (EDR) concepts Soft Skills β’ Exceptional communication skills with ability to explain technical concepts to varied audiences β’ Strong presentation and training delivery capabilities β’ Self-motivated with excellent time management and prioritization skills β’ Customer-focused mindset with commitment to driving customer success β’ Ability to work independently in a remote/embedded environment β’ Strong problem-solving and analytical thinking abilities Bonus Points: β’ Experience with Crowd Strike Falcon platform and Next-Gen SIEM β’ Crowd Strike certification (CCFA, CCFH, or similar) β’ Previous consulting or customer-facing technical role experience β’ Industry certifications (CISSP, GCIA, GCIH, CEH, or similar) β’ Experience with SOAR platforms and security automation β’ Knowledge of threat intelligence platforms and frameworks #LI-DL1 #LI-Remote This role may require the candidate to periodically undergo and pass alcohol and/or drug test(s) during the course of employment. Benefiβ¦ Apply tot his job
Apply tot his job
Apply To this Job