CrowdStrike

Senior Analyst, Active Defense Services

CrowdStrike

full-time

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $100,000 - $155,000 per year

Job Level

About the role

  • Find the bad guys, remove the bad guys, and keep them out so our customers can keep their business moving forward.
  • Exercise incident handling and remediation processes across Windows, Mac, and Linux platforms.
  • Perform basic malware analysis.
  • Develop and improve processes for incident detection and the execution of countermeasures.
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
  • Provide continuous feedback and solutions for operational collateral and capabilities.

Requirements

  • Must be willing to work 4x10 schedule, including a day on the weekend.
  • Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in Python, PowerShell, or .NET, or the desire to learn, with experience coding in other languages such as C, C#, VB, Python, Perl, Ruby on Rails, etc.
  • Capable of completing technical tasks without supervision.
  • Desire to grow and expand both technical and soft skills.
  • Strong project management skills.
  • Contributing thought leader within the incident response industry.
  • Ability to foster a positive work environment and attitude.
  • Desire and ability to effectively communicate with customers during ongoing security incidents.
Benefits
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
incident handlingmalware analysiscomputer forensic analysisnetwork forensic analysisincident remediationsystems administrationnetwork operationsprogrammingscriptingnetwork architecture
Soft Skills
communicationproject managementleadershipproblem-solvingteamworkadaptabilitycustomer servicecritical thinkingfeedbackpositive attitude