Sr. Intrusion Analyst (Remote)
About the Role:
The CrowdStrike OverWatch team is seeking a motivated professional with technical skills to analyze endpoint telemetry looking for sophisticated or low-footprint intrusions against CrowdStrike customers. We are also focused on improving detection capability and efficiency for the Falcon Host platform through tactical analysis of ongoing attacks by sophisticated real-world threats impacting our customer base. If you are proficient in either network or host-based intrusion analysis, or have a strong cyber threat intelligence background dealing with advanced threat actors, we might have a role for you!
Additionally, to support our ongoing capability requirements, we are considering candidates with backgrounds or experience in malware analysis, incident response or forensic investigation, cloud security operations, cloud security architecture, DevOps engineering, or tool development who might provide demonstrated value to our detection effort.
Remote U.S. role within a reasonable commuting distance to one of the following offices: Sunnyvale, CA; Irvine, CA; El Segundo, CA; Austin, TX; Seattle, WA; Kirkland, WA; Columbia, MD; Boston, MA; Arlington, VA; St. Louis, MO; Minneapolis, MN.
We would like to hear from you if:
You are proficient in English, both written and spoken,
You can demonstrate experience in conventional network and/or host-based intrusion analysis,
You are capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders
You are comfortable assessing and producing cyber threat intelligence, open source intelligence or industry reporting,
You have an excellent understanding of the Windows, Linux or OS X operating systems, and
You are looking for a dynamic, fast-paced and challenging role in an unconventional team environment.
Additionally:
We highly value prior working experience in an area of cyber security intelligence,
You should have a good understanding of current and emerging threats, and the ability to demonstrate practical knowledge of security research,
You should have a working understanding of how various Governments carry out cyber espionage and for what purposes they do this,
You can demonstrate experience in conventional network or host-based intrusion analysis, cloud security, or mobile device security.
What You'll Need:
Bachelor’s degree in a relevant field or comparable work experience,
A demonstrable understanding of advanced persistent threat adversaries,
Ability to convey complex or difficult technical concepts to audiences with varying levels of technical ability.
#LI-JW1
#LI-Remote