CrowdStrike is looking for highly motivated, self-driven, technical senior analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time to protect our customers.
Candidates Also Search: Remote Jobs In United Kingdom
- Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents?
- Do you want to respond to incidents of all severities and fight back against adversaries big and small?
- Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
- Do you crave new and innovative work that actually matters to your customer?
- Do you have an Incident Response or Information Security background that you’re not fully utilizing?
- Are you capable of contributing to a diverse team and interacting well with customers?
- Do you love working around like-minded people in a world class team who you can both learn from and mentor on a daily basis?
What You'll Do:
- Conduct monitoring and perform in-depth analysis of security alerts using the CrowdStrike platform.
- Exercise incident handling processes across Windows, Mac, and Linux platforms.
- Perform malware analysis.
- Perform remote remediation of malware or malicious activity.
- Develop and improve processes for incident detection, triage, and the execution of countermeasures
- Produce high-quality written and verbal communications, recommendations, and findings to customer management.
- Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
- Assist in the advancement of security processes and procedures.
Candidates Also Search: Remote Software/ IT jobs
What You'll Need:
Successful candidates will have experience in one or more of the following areas:
- Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
- Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
- Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
- Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET.
- At least one relevant security certification
- Strong verbal and communication skills
- Strong problem-solving skills
- Strong experience with Mac OS, Windows, and Unix operating systems.
- Ability to handle high pressure situations in a productive and professional manner.
- Strong time management skills with the ability to multitask
- BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or suitable relevant work experience.