Posted in Other 28 days ago.
Location: Sunnyvale, California
Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating active security incidents?
Are you passionate about helping customers during their most difficult times?
Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
Do you crave new and innovative work that actually matters to your customer?
Are you capable of leading teams and interacting well with customers?
Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?
Monitor, analyze, and respond to active security threats using the CrowdStrike Falcon Platform.
Support ingestion, enablement, and analysis of customer 3rd Party Data into Falcon’s Next-Gen SIEM
Exercise incident handling and remediation processes across Windows, Mac, and Linux platforms.
Perform basic malware analysis.
Develop and improve processes for incident detection and the execution of countermeasures
Produce high-quality written and verbal communications, recommendations, and findings to customer management and CrowdStrike Incident Response stakeholders
Provide continuous feedback and solutions for operational collateral and capabilities
Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
Managed Detection & Response: While we aren’t an MDR/SOC, you will require similar experience detecting, analyzing, and responding to active threats across multiple customers
Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
Basic Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware
Relevant incident handling and incident management experience
Capable of completing technical tasks without supervision.
Desire to grow and expand both technical and soft skills.
Strong project management skills.
Contributing thought leader within the incident response industry.
Ability to foster a positive work environment and attitude.
Desire and ability to effectively communicate with customers during ongoing security incidents.
CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
PI253826272
Meta
|
Infinera
|
CrowdStrike, Inc.
|