Apply

Ready to go for it?

AI Apply speeds things up—apply directly if you prefer.

FREE ACCESS
5,000–10,000 jobs/day
JobTailor Logo

See all jobs on JobTailor

Search thousands of fresh jobs every day.

Discover
  • Fresh listings
  • Fast filters
  • No subscription required
Create a free account and start exploring right away.
CrowdStrike

Incident Response Consultant

CrowdStrike

. Serve as part the technical team on incident response engagements .

Posted 4/21/2026full-timeRemote • 🇺🇸 United StatesMid-LevelSenior💰 $95,000 - $140,000 per yearWebsite

Tech Stack

Tools & technologies
AWSAzureCloudGoogle Cloud PlatformLinux

About the role

Key responsibilities & impact
  • Serve as part the technical team on incident response engagements
  • Develop and use new methods to hunt for bad actors across large sets of data.
  • Work under the direction of project leadership and outside counsel to conduct intrusion investigations
  • Perform host and/or network-based forensics across Windows, Mac, and Linux platforms.
  • Support the production of high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including customer management, regulators, and legal counsel

Requirements

What you’ll need
  • Successful candidates will have knowledge of or experience in one or more of the following areas:
  • Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Nation-State, E-Crime, and Hacktivists.
  • Computer Forensic Analysis: a background using forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs.
  • Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis.
  • Incident Remediation: strong understanding of targeted attacks and able to support creating customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: understanding of secure network architecture and strong background in performing network operations.
  • Cloud Incident Response: knowledge of AWS, Azure, or GCP incident response methodologies.
  • Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams
  • Capable of completing technical tasks with limited supervision.
  • Desire to grow and expand both technical and soft skills.
  • Ability to foster a positive work environment and attitude.

Benefits

Comp & perks
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe

ATS Keywords

✓ Tailor your resume
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
incident responsecomputer forensic analysisnetwork forensic analysisreverse engineeringincident remediationnetwork operationsnetwork architecturecloud incident responsemalware analysisdata analysis
Soft Skills
communicationteamworkproblem-solvingadaptabilityattention to detailreport writingpresentation skillsinterpersonal skillsleadershippositive attitude