Senior Analyst at CrowdStrike
About the Role:
CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.
This position is open to candidates in Austin, TX, San Antonio, TX and St. Louis, MO.
U.S. Citizens and Green Card holders only.
Am I an Analyst, Endpoint Protection Team Candidate?
- Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents?
- Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
- Do you crave new and innovative work that actually matters to your customer?
- Do you have an Incident Response or Information Security background that you’re not fully utilizing?
- Are you capable of leading teams and interacting well with customers?
- Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?
- Exercise incident handling processes across Windows, Mac, and Linux platforms.
- Perform basic malware analysis.
- Develop and improve processes for incident detection and the execution of countermeasures
- Produce high-quality written and verbal communications, recommendations, and findings to customer management.
- Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
- Manage internal programs or teams.
What You'll Need:
Successful candidates will have experience in one or more of the following areas:
- Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
- Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
- Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
- Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
- Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
- Programming/Scripting: experience coding in C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
Additionally, all candidates must possess the following qualifications:
- Capable of completing technical tasks without supervision.
- Desire to grow and expand both technical and soft skills.
- Strong project management skills.
- Contributing thought leader within the incident response industry.
- Ability to foster a positive work environment and attitude.
BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.