Threat Analyst (Remote, ROU) at CrowdStrike
Bucharest, , Romania -
Full Time


Start Date

Immediate

Expiry Date

25 Dec, 25

Salary

0.0

Posted On

26 Sep, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Threat Analysis, Adversary Tactics, Log Interpretation, EDR Products, Endpoint Security, Windows, Linux, MacOSX, Research Skills, Documentation, Collaboration, Automation, Penetration Testing, Forensics, Dynamic Malware Analysis, SDLC

Industry

Computer and Network Security

Description
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. We work on large scale distributed systems, processing almost 3 trillion events per day and this traffic is growing daily. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: The CrowdStrike EndPoint Protection (EPP) Content product group is seeking a highly motivated individual with strong technical acumen to join our Threat Efficacy team. In this role, you will be responsible for monitoring and analyzing the extensive array of detections and preventions deployed by various internal teams within CrowdStrike. The primary objectives of this team include responding to customer inquiries regarding threat detections and capabilities, proactively managing false positives, and enhancing the overall efficacy of our content. This position will involve close collaboration with internal teams such as Technical Account Managers, Support engineers, Falcon Complete, Data Science, and content engineering teams within the organization. Security Response is committed to addressing our customers' security needs as threats evolve and ensuring CrowdStrike maintains coverage of all relevant threats, regardless of the source of attack. Falcon Sensor is a unique endpoint detection and response solution, and Security Analysts on the Security Response Team will have the opportunity to translate their analysis findings into impactful detection capabilities. What You'll Do: Provide assistance to various internal teams in the creation of new detections, improvements to existing models, and assessment of detection gaps related to various CrowdStrike products. Document and offer expert-level information to diverse stakeholders regarding content detections within CrowdStrike Falcon. Support customers and teams in enhancing or suppressing detection alerts. Develop new detection content based on adversarial or testing activity observed in logs. What You'll Need: Comprehensive understanding of common adversary tactics and techniques. Demonstrated ability to analyze complex situations and articulate information clearly to diverse stakeholders. Profound understanding of and ability to interpret logs generated by systems, networks, and applications. Proven experience in identifying and isolating unique patterns within process behavior or logs (e.g., RegEx, correlation rules, YARA). Prior experience with EDR products and endpoint security monitoring. Expertise in and understanding of Windows, Linux, and MacOSX operating systems. Capacity to contribute both independently and collaboratively within a team environment. Possess an inquisitive nature and the ability to conduct thorough research using historical data. Exhibit a keen eye for documenting pertinent details and facilitating focused discussions. Eagerness to acquire new knowledge and skills. Bonus Points: Experience in a security operations center or similar environment responding to incidents. Demonstrated ability to automate repetitive tasks to enhance overall work efficiency. In-depth experience with and knowledge of penetration testing (red team) methodologies and tools. Forensic experience is highly desirable. Proficiency in utilizing Jira for the management and maintenance of development queues. Working knowledge of various programming/scripting languages, dynamic malware analysis and sandboxing, and/or penetration testing tools and techniques. Good understanding of the application development life cycle (SDLC). Education: BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field #LI-DM1 #LI-Remote Benefits of Working at CrowdStrike: Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified™ across the globe CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance. CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
Responsibilities
Monitor and analyze threat detections and preventions deployed by internal teams. Collaborate with various teams to enhance detection capabilities and respond to customer inquiries.
Loading...