Do you have what it takes to become a world-class threat hunter? Do you want to disrupt eCrime operations, and have a real impact defending our customers infrastructures?
We have a unique opportunity for you!The CrowdStrike OverWatch team is seeking a motivated intrusion analyst with outstanding technical skills to analyse adversary activity, identify intrusions, and develop cutting-edge tools to improve our detection capabilities.
What You'll Do:
As a intrusion analyst on the OverWatch team, you will have the unique opportunity to be part of a world-class team in which you will join the fight against eCrime adversaries, by pivoting through huge datasets collected by Crowdstrikes Falcon sensor, finding creative ways of identifying malicious activity, notifying our customers and improving our tools and processes. As part of our remote close-knit team, you will bring with you your experience in cybersecurity or threat intelligence to help evolve how we do threat hunting at CrowdStrike.
We have a unique opportunity for you!The CrowdStrike OverWatch team is seeking a motivated intrusion analyst with outstanding technical skills to analyse adversary activity, identify intrusions, and develop cutting-edge tools to improve our detection capabilities.
What You'll Do:
As a intrusion analyst on the OverWatch team, you will have the unique opportunity to be part of a world-class team in which you will join the fight against eCrime adversaries, by pivoting through huge datasets collected by Crowdstrikes Falcon sensor, finding creative ways of identifying malicious activity, notifying our customers and improving our tools and processes. As part of our remote close-knit team, you will bring with you your experience in cybersecurity or threat intelligence to help evolve how we do threat hunting at CrowdStrike.
Requirements:
You are proficient in English both written and spoken.
You have prior work experience in the cybersecurity or threat intelligence fields.
You have the ability to think analytically and possess critical thinking skills to assess activity quickly and accurately.
You are capable and comfortable communicating technical concepts to various audiences both verbally and in writing.
As this is a 100% remote role, you are self-motivated, proactive and seek to be actively engaged with your peers.
You are looking for a dynamic, fast-paced, and challenging role in an unconventional team environment.
Technical Requirements:
You are curious and keep up-to-date across the cybersecurity landscape.
You are familiar with adversary techniques and attack lifecycles. (e.g: adversary progression through techniques found in the MITRE ATT&CK matrix)
You have knowledge of operating systems fundamentals (Windows, bonus points for Linux and others).
You have an understanding of administrative tools and how adversaries may leverage them to live-off-the-land.
You have basic knowledge of conventional network/host-based intrusion analysis, digital forensics, or handling malware.
You are aware of cyber threat intelligence, open source intelligence or industry reporting and understand its importance to an organization.
Bonus Points:
Completion of Capture-The-Flag competitions.
Blog posts, articles, projects, code or any sources to showcase previous work in the field.
Experience or interest using programming or scripting languages, in particular Python or Go.
You are proficient in English both written and spoken.
You have prior work experience in the cybersecurity or threat intelligence fields.
You have the ability to think analytically and possess critical thinking skills to assess activity quickly and accurately.
You are capable and comfortable communicating technical concepts to various audiences both verbally and in writing.
As this is a 100% remote role, you are self-motivated, proactive and seek to be actively engaged with your peers.
You are looking for a dynamic, fast-paced, and challenging role in an unconventional team environment.
Technical Requirements:
You are curious and keep up-to-date across the cybersecurity landscape.
You are familiar with adversary techniques and attack lifecycles. (e.g: adversary progression through techniques found in the MITRE ATT&CK matrix)
You have knowledge of operating systems fundamentals (Windows, bonus points for Linux and others).
You have an understanding of administrative tools and how adversaries may leverage them to live-off-the-land.
You have basic knowledge of conventional network/host-based intrusion analysis, digital forensics, or handling malware.
You are aware of cyber threat intelligence, open source intelligence or industry reporting and understand its importance to an organization.
Bonus Points:
Completion of Capture-The-Flag competitions.
Blog posts, articles, projects, code or any sources to showcase previous work in the field.
Experience or interest using programming or scripting languages, in particular Python or Go.
This position is open to all candidates.