This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.
Role Description
CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.
This is a 3rd Shift Role (11pm-10am).
• Exercise incident handling processes across Windows, Mac, and Linux platforms.
• Perform basic malware analysis.
• Develop and improve processes for incident detection and the execution of countermeasures.
• Produce high-quality written and verbal communications, recommendations, and findings to customer management.
• Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
Qualifications
• Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
• Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
• Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
• Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
• Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
• Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
• Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
• Programming/Scripting: experience coding in C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
• Capable of completing technical tasks without supervision.
• Desire to grow and expand both technical and soft skills.
• Strong project management skills.
• Contributing thought leader within the incident response industry.
• Ability to foster a positive work environment and attitude.
Requirements
• Must be willing to work 4x10 schedule, including a day on the weekend.
• This role is only open to US citizens and Green Card holders.
• This is a 3rd Shift role, 11pm-10am.
Education
• BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.
• Applicants without a degree but with relevant work experience and/or training will be considered.
Benefits
• Market leader in compensation and equity awards.
• Comprehensive physical and mental wellness programs.
• Competitive vacation and holidays for recharge.
• Paid parental and adoption leaves.
• Professional development opportunities for all employees regardless of level or role.
• Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
• Vibrant office culture with world class amenities.
• Great Place to Work Certified™ across the globe.