Company Overview
About the job
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About The Role
Our CrowdStrike Data Science Machine Learning Operations and Response Team (MORE) is looking for a Threat Analyst who is both customer- and team-focused. This role will include both proactive and reactive aspects. This role will be perfect for anyone who has experience involving security operations, security detections, and/or reverse engineering. This team is focused on improving detection capability and efficiency through malware or data analysis. The primary responsibility of this role is to verify the efficacy of security detections in both our enterprise and SMB products by investigating customer escalations. Experience with using machine learning in the context of security at scale is a plus.
Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization – including detection efficacy and managing false positive detections.
This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science.
What You’ll Do
- Review threat detections to ensure they are performing to company and industry standards
- Manage and fix false positive and false negative detections
- Analyze binary files, URLs, SMS messages, and other data types to determine their legitimacy or risk
- Address internal questions and concerns regarding threat detections
What You’ll Need
- Experience with reverse engineering malware, or binary analysis
- Fundamental understanding of attributes of binary files such as imports/exports and packers
- Knowledge of programming and scripting languages, in particular Python and powershell
- Ability to demonstrate practical knowledge of research/collection skills and analytical methods
- General understanding of threat/risk management, security operations, or attacker kill chains
- Ability to break down complex problems into workable components
Bonus Points
- Experience in a security operations center or incident response
- A thorough understanding of Windows OS internals and the Windows API
- Knowledge of MacOS and/or Linux
- Familiarity with red team/adversary tools
- A background in exploit and vulnerability analysis
- Experience with machine learning
- Experience with cloud environments
Education
- BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field
APPLY