Posted in Other 16 days ago.
Location: Topeka, Vermont
Do you find yourself interested in and keeping up with the latest Azure, AWS, and GCP vulnerabilities and breaches?
Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
Do you crave new and innovative work that actually matters to your customer?
Do you have an Incident Response or Information Security background that you’re not fully utilizing?
Are you capable of operating as an individual contributor and occasionally leading teams and interacting with customers?
Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?
Manage projects and perform forensic analysis on incident response engagements involving Azure, AWS, or GCP data
Manage projects and perform analysis on technical assessments looking for compromise or security misconfigurations in Azure, AWS, or GCP
Manage projects and deliver adversary simulation (purple team) exercises in Azure, AWS and GCP.
Produce high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including customer management, regulators, and legal counsel.
Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
Cloud Incident Response: knowledge in AWS, Azure, or GCP incident response methodologies.
Cloud Operations: familiarity with how modern workloads work in the cloud - DevOps, CICD pipelines, containers, functions, etc. and related security defenses and pitfalls.
Incident Response: experience supporting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists.
In-depth knowledge of Cloud Service Providers Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations related to major cloud platforms.
Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams
Capable of completing technical tasks without supervision.
Desire to grow and expand both technical and soft skills.
Strong project management skills.
Contributing thought leader within the incident response industry.
Ability to foster a positive work environment and attitude.
BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Applicants without a degree but with relevant work experience and/or training will be considered.
#LI-AC1
#LI-Remote
Remote-first culture
Market leader in compensation and equity awards
Competitive vacation and flexible working arrangements
Comprehensive and inclusive health benefits
Physical and mental wellness programs
Paid parental leave, including adoption
A variety of professional development and mentorship opportunities
Offices with stocked kitchens when you need to fuel innovation and collaboration
We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
PI240976721
CrowdStrike, Inc.
|
CrowdStrike, Inc.
|
CrowdStrike, Inc.
|