Threat Hunter - GovCloud, 3rd Shift (Remote) jobs in United States
cer-icon
Apply on Employer Site
company-logo

CrowdStrike · 3 days ago

Threat Hunter - GovCloud, 3rd Shift (Remote)

CrowdStrike is a global leader in cybersecurity, dedicated to stopping breaches with advanced AI-native platforms. The role involves analyzing threat actor activity, identifying intrusions, and improving detection capabilities as part of a proactive threat hunting team.

Artificial Intelligence (AI)Cloud Data ServicesCloud SecurityCyber SecurityNetwork Security
check
Growth Opportunities
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Protect our customer's networks by identifying and understanding intrusions using Falcon Endpoint data and the broader CrowdStrike product suite
Analyze adversary activity and communicate those findings to customers as part of our fast-paced time sensitive mission to help stop breaches
Undertake research to improve our detection capabilities and understand our adversaries
Participate in active and passive threat hunting and gain fast-paced experience in dealing with threat actors

Qualification

Network/host-based intrusion analysisDigital forensicsCyber threat intelligenceProgramming/scripting PythonProgramming/scripting GoOperating systems knowledgeAdversary techniques knowledgeSecurity operations center experienceResearch publication experienceEmerging threatsLogging platformsCommunication skills

Required

Ability to demonstrate experience in conventional network\host-based intrusion analysis, digital forensics, or handling malware
A strong grasp of how Windows, MacOs and Linux operating systems function
Comfortability assessing cyber threat intelligence, open-source intelligence or industry reporting
Knowledge of programming and scripting languages, in particular Python or Go
A strong understanding of administrative tools and how adversaries may leverage them to live-off-the-land
Familiarity with adversary techniques and attack lifecycles. (e.g: adversary progression through techniques found in the MITRE ATT&CK® matrix)
Willingness to work in a dynamic, fast-paced, and challenging role in an unconventional team environment
Ability to communicate actionable threat intelligence to both technical and executive-level stakeholders

Preferred

Deeper knowledge of operating systems other than Windows (Linux, Mac)
Hands-on experience hunting for and/or responding to incidents associated with eCrime and/or Nation-state adversaries
Experience in a security operations center or similar environment tracking threat actors or responding to incidents
Experience publishing research papers at conferences or through other mediums (blogs, articles)
A good understanding of current and emerging threats and the ability to demonstrate practical knowledge of security research
Experience with logging platforms such as LogScale, Splunk, or Kibana and creating queries to identify suspicious activity

Benefits

Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Market leader in compensation and equity awards
Health insurance
401k
Paid time off

Company

CrowdStrike

company-logo
CrowdStrike is a cybersecurity technology firm that provides cloud-delivered protection for cloud workloads, identity, and data.

Funding

Current Stage
Public Company
Total Funding
$1.24B
Key Investors
ARK Investment ManagementAccelCapitalG
2022-12-01Post Ipo Equity· $4.6M
2021-01-12Post Ipo Debt· $750M
2019-06-12IPO

Leadership Team

leader-logo
George Kurtz
President / CEO & Founder
linkedin
leader-logo
Zeki Turedi
Field CTO Europe
linkedin
Company data provided by crunchbase