crowdstrikecareers

CrowdStrike, founded in 2011, is a cybersecurity company that offers advanced endpoint protection and expert intelligence to combat sophisticated cyber attacks targeting leading businesses. Their innovative Falcon platform redefines endpoint security with a focus on stopping breaches rather than just detecting malware.

Related companies:

Jobs at this company:

Apply
🔥 IAM Security Architect
Posted about 6 hours ago

📍 Romania

🔍 Cybersecurity

  • Identity and access management solutions (Okta, Ping Identity, Microsoft Entra ID, etc.)
  • Privileged Access Management (PAM) tools such as Delinea, CyberArk, and/or BeyondTrust
  • Single Sign-On (SSO), MFA, and Federation protocols (SAML, OAuth, OpenID Connect)
  • Role-based access control (RBAC) and attribute-based access control (ABAC)
  • Cloud IAM configurations across AWS, Azure, and Google Cloud Platform (GCP)
  • IAM automation and orchestration
  • Leads the planning, implementation, documentation, and testing of IAM security solutions
  • Develops IAM security standards, policies, and procedures
  • Partner with business units to integrate secure identity and access controls across various business use cases
  • Determine security requirements by evaluating business strategies and needs; research information security standards; plan and collaborate with team members in conducting system security and vulnerability analyses and risk assessments
  • Oversee the implementation of identity governance, multi-factor authentication (MFA) solutions, and Zero Trust solutions
  • Maintain relevant job knowledge by tracking and understanding emerging security practices and standards; participate in educational opportunities; participating in professional organizations
  • Enhance department and organization reputation by accepting ownership for accomplishing tasks; exploring opportunities to add value to job accomplishments
  • Assist with ad-hoc operational tasks as required

CybersecurityLDAP

Posted about 6 hours ago
Apply
Apply

📍 Romania

🔍 Cybersecurity

  • Advanced knowledge of server and client operating systems.
  • Extensive computer skills and an understanding of networking, cryptography, web applications, databases, and wireless technologies.
  • Ability to prioritize impactful findings and drive these items to remediation.
  • Experience working with Mac, Windows, Linux and/or other Unix-like variants.
  • Extensive understanding of TCP, UDP, HTTP, IP and other network protocols.
  • A detailed understanding of how to triage vulnerabilities using CVSS calculators and the ability to validate security related findings.
  • Possess the ability to work independently.
  • Proactive go-getter attitude to solve challenging problems.
  • Stays up to date with current vulnerabilities and vulnerability related news in various industries.
  • Ability to automate and script tasks using your preferred language (e.g. GoLang, Python, Ruby, Perl, BASH).
  • Perform comprehensive penetration testing assessments across the organization.
  • Manage the entire lifecycle of penetration testing findings from discovery, triage, advising, remediation, and validation.
  • Work with various different business units to perform penetration testing assessments on systems or applications before go live rollouts.
  • Examine systems and applications to assess the current security posture.
  • Manage penetration testing related tickets to ensure issues are remediated within proper timelines.
  • Advocate for security best practices across the organization.

AWSDockerPythonBashCybersecurityGCPKubernetesAzureCommunication SkillsAnalytical SkillsCI/CDRESTful APIsLinuxTerraformAnsibleScripting

Posted about 6 hours ago
Apply
Apply

📍 Romania

🔍 Cybersecurity

  • 1–3 years of hands-on SOC experience performing alert triage, incident handling, and first-responder containment while working daily with SIEM/SOAR, EDR, IDS/IPS, firewalls/proxies, email-security tools, and deep log analysis.
  • Practical knowledge of Windows, macOS, and Linux internals and logging (Event Logs, Sysmon, auditd, etc.).
  • Solid grasp of TCP/IP, OSI layers, and common protocols (HTTP/S, DNS, SMTP); able to interpret packet captures and network logs.
  • Proficiency with search/query languages (LQL, SPL, KQL, SQL etc.) to enrich alerts and investigate indicators, mapping findings to MITRE ATT&CK techniques.
  • Demonstrated experience responding to hacktivist, cyber-crime, or APT activity—triage, containment, escalation, and thorough documentation.
  • Capable of completing technical tasks independently, maintaining composure during incident response actions, and fostering a positive, collaborative work environment.
  • Strong verbal and written communication, analytical problem-solving, time-management, and project-management skills; desire to grow and continuously improve both technical and soft skills.
  • Provide continuous coverage for SIEM/SOAR, EDR, network, cloud, and email-security consoles; rapidly validate alerts, enrich with context, suppress false positives, and act on confirmed threats.
  • Gather evidence from logs, host telemetry, and threat-intel feeds to determine scope, severity, and business impact.
  • Execute pre-approved playbook actions (host isolation, account disablement, phishing-email purge, firewall block, etc.) and confirm containment success.
  • Escalate high-severity or complex incidents to senior analysts/IR leadership, providing concise incident summaries and proposed mitigation steps while staying engaged through resolution.
  • Consistently meet or exceed response-time targets for critical and high-urgency tickets.
  • Record investigative steps, evidence, and decisions in the ticketing system; deliver clear shift-handoff notes to support 24x7 operations.
  • Identify noisy rules, false-positive trends, blind spots, or missing log sources; collaborate on custom detections and log-source onboarding to improve alert fidelity.
  • Participate in the refinement of existing runbooks, draft new ones, and champion automation opportunities that reduce analyst toil.

PythonSQLBashLinuxScripting

Posted about 6 hours ago
Apply
Apply

📍 Romania

🔍 Cybersecurity

  • 1–3 years of hands-on SOC experience performing alert triage, incident handling, and first-responder containment while working daily with SIEM/SOAR, EDR, IDS/IPS, firewalls/proxies, email-security tools, and deep log analysis.
  • Practical knowledge of Windows, macOS, and Linux internals and logging (Event Logs, Sysmon, auditd, etc.).
  • Solid grasp of TCP/IP, OSI layers, and common protocols (HTTP/S, DNS, SMTP); able to interpret packet captures and network logs.
  • Proficiency with search/query languages (LQL, SPL, KQL, SQL etc.) to enrich alerts and investigate indicators, mapping findings to MITRE ATT&CK techniques.
  • Demonstrated experience responding to hacktivist, cyber-crime, or APT activity—triage, containment, escalation, and thorough documentation.
  • Capable of completing technical tasks independently, maintaining composure during incident response actions, and fostering a positive, collaborative work environment.
  • Strong verbal and written communication, analytical problem-solving, time-management, and project-management skills; desire to grow and continuously improve both technical and soft skills.
  • Provide continuous coverage for SIEM/SOAR, EDR, network, cloud, and email-security consoles; rapidly validate alerts, enrich with context, suppress false positives, and act on confirmed threats.
  • Gather evidence from logs, host telemetry, and threat-intel feeds to determine scope, severity, and business impact.
  • Execute pre-approved playbook actions (host isolation, account disablement, phishing-email purge, firewall block, etc.) and confirm containment success.
  • Escalate high-severity or complex incidents to senior analysts/IR leadership, providing concise incident summaries and proposed mitigation steps while staying engaged through resolution.
  • Consistently meet or exceed response-time targets for critical and high-urgency tickets.
  • Record investigative steps, evidence, and decisions in the ticketing system; deliver clear shift-handoff notes to support 24x7 operations.
  • Identify noisy rules, false-positive trends, blind spots, or missing log sources; collaborate on custom detections and log-source onboarding to improve alert fidelity.
  • Participate in the refinement of existing runbooks, draft new ones, and champion automation opportunities that reduce analyst toil.

PythonSQLBashLinuxScripting

Posted about 6 hours ago
Apply
Apply

📍 Romania

🔍 Cybersecurity

  • 1–3 years of hands-on SOC experience performing alert triage, incident handling, and first-responder containment while working daily with SIEM/SOAR, EDR, IDS/IPS, firewalls/proxies, email-security tools, and deep log analysis.
  • Practical knowledge of Windows, macOS, and Linux internals and logging (Event Logs, Sysmon, auditd, etc.).
  • Solid grasp of TCP/IP, OSI layers, and common protocols (HTTP/S, DNS, SMTP); able to interpret packet captures and network logs.
  • Proficiency with search/query languages (LQL, SPL, KQL, SQL etc.) to enrich alerts and investigate indicators, mapping findings to MITRE ATT&CK techniques.
  • Demonstrated experience responding to hacktivist, cyber-crime, or APT activity—triage, containment, escalation, and thorough documentation.
  • Capable of completing technical tasks independently, maintaining composure during incident response actions, and fostering a positive, collaborative work environment.
  • Strong verbal and written communication, analytical problem-solving, time-management, and project-management skills; desire to grow and continuously improve both technical and soft skills.
  • Provide continuous coverage for SIEM/SOAR, EDR, network, cloud, and email-security consoles; rapidly validate alerts, enrich with context, suppress false positives, and act on confirmed threats.
  • Gather evidence from logs, host telemetry, and threat-intel feeds to determine scope, severity, and business impact.
  • Execute pre-approved playbook actions (host isolation, account disablement, phishing-email purge, firewall block, etc.) and confirm containment success.
  • Escalate high-severity or complex incidents to senior analysts/IR leadership, providing concise incident summaries and proposed mitigation steps while staying engaged through resolution.
  • Consistently meet or exceed response-time targets for critical and high-urgency tickets.
  • Record investigative steps, evidence, and decisions in the ticketing system; deliver clear shift-handoff notes to support 24x7 operations.
  • Identify noisy rules, false-positive trends, blind spots, or missing log sources; collaborate on custom detections and log-source onboarding to improve alert fidelity.
  • Participate in the refinement of existing runbooks, draft new ones, and champion automation opportunities that reduce analyst toil.

PythonSQLBashLinuxScripting

Posted about 6 hours ago
Apply
Apply

📍 Romania

🔍 Cybersecurity

  • 1–3 years of hands-on SOC experience performing alert triage, incident handling, and first-responder containment while working daily with SIEM/SOAR, EDR, IDS/IPS, firewalls/proxies, email-security tools, and deep log analysis.
  • Practical knowledge of Windows, macOS, and Linux internals and logging (Event Logs, Sysmon, auditd, etc.).
  • Solid grasp of TCP/IP, OSI layers, and common protocols (HTTP/S, DNS, SMTP); able to interpret packet captures and network logs.
  • Proficiency with search/query languages (LQL, SPL, KQL, SQL etc.) to enrich alerts and investigate indicators, mapping findings to MITRE ATT&CK techniques.
  • Demonstrated experience responding to hacktivist, cyber-crime, or APT activity—triage, containment, escalation, and thorough documentation.
  • Capable of completing technical tasks independently, maintaining composure during incident response actions, and fostering a positive, collaborative work environment.
  • Strong verbal and written communication, analytical problem-solving, time-management, and project-management skills; desire to grow and continuously improve both technical and soft skills.
  • Provide continuous coverage for SIEM/SOAR, EDR, network, cloud, and email-security consoles; rapidly validate alerts, enrich with context, suppress false positives, and act on confirmed threats.
  • Gather evidence from logs, host telemetry, and threat-intel feeds to determine scope, severity, and business impact.
  • Execute pre-approved playbook actions (host isolation, account disablement, phishing-email purge, firewall block, etc.) and confirm containment success.
  • Escalate high-severity or complex incidents to senior analysts/IR leadership, providing concise incident summaries and proposed mitigation steps while staying engaged through resolution.
  • Consistently meet or exceed response-time targets for critical and high-urgency tickets.
  • Record investigative steps, evidence, and decisions in the ticketing system; deliver clear shift-handoff notes to support 24x7 operations.
  • Identify noisy rules, false-positive trends, blind spots, or missing log sources; collaborate on custom detections and log-source onboarding to improve alert fidelity.
  • Participate in the refinement of existing runbooks, draft new ones, and champion automation opportunities that reduce analyst toil.

PythonSQLCybersecurityLinuxScripting

Posted about 6 hours ago
Apply
Apply

📍 United Kingdom

🔍 Cybersecurity

  • Experience in one or more of the following areas: Incident Handling, Computer Forensic Analysis, Systems Administration, Malware Analysis, Incident Remediation.
  • Experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET.
  • At least one relevant security certification.
  • Strong verbal and communication skills.
  • Strong problem-solving skills.
  • Strong experience with Mac OS, Windows, and Unix operating systems.
  • Ability to handle high pressure situations in a productive and professional manner.
  • Strong time management skills with the ability to multitask.
  • BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or suitable relevant work experience.
  • Conduct monitoring and perform in-depth analysis of security alerts using the CrowdStrike platform.
  • Exercise incident handling processes across Windows, Mac, and Linux platforms.
  • Perform malware analysis.
  • Perform remote remediation of malware or malicious activity.
  • Develop and improve processes for incident detection, triage, and the execution of countermeasures.
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
  • Assist in the advancement of security processes and procedures.

PythonCybersecurityMac OS XRESTful APIsLinuxScripting

Posted about 6 hours ago
Apply
Apply

📍 Singapore

🔍 Cybersecurity

  • Cyber threat Incident Handling: experience conducting or managing cyber threat related incident response for organizations, investigating targeted threats such as Advanced Persistent Threat, Organized Crime, and Hacktivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware
  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails and .NET.
  • Conduct monitoring and perform in-depth analysis of security alerts.
  • Exercise cyber incident handling processes across Windows, Mac, and Linux platforms.
  • Perform remote remediation of malware or malicious activity.
  • Perform high level malware analysis.
  • Develop and improve processes for cyber incident detection, triage, and the execution of countermeasures
  • Produce high-quality written and verbal communications, recommendations, and findings to numerous stakeholders including senior leadership within Crowdstrike and customers. .
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
  • Contribute to internal capability uplift programs or team development.
  • Serve as the technical escalation point and mentor for lower grade analysts.
  • Provide oversight and quality assurance for issues worked by lower grade analysts.
  • Assist in the advancement of security processes and procedures.

BashCybersecurityMac OS XMicrosoft Active DirectoryC#API testingRESTful APIsLinuxWritten communicationVerbal communicationJSON

Posted about 6 hours ago
Apply
Apply

📍 Romania

đź§­ Full-Time

🔍 Cybersecurity

  • A good understanding of JavaScript and experience building web application user interfaces with modern frameworks such as Ember, React, Angular, or Vue.
  • Strong HTML & CSS skills, including experience with CSS pre- or post-processors (like Sass or PostCSS) and CSS frameworks like Tailwind CSS
  • Experience with testing frameworks, tools and methodologies such as QUnit or Mocha
  • Knowledge & interest in developing genuinely accessible interfaces.
  • Comfort with Git or similar version control systems and workflows.
  • Build single page applications in Ember
  • Leverage your technical expertise to help the team sound decisions around engineering, product direction and design
  • Take initiative and build tools that improve your teams’ development experience
  • Write automated tests for your code
  • Collaborate with fellow UX Engineers, Cloud Engineers, UX Designers, QA Engineers, Product Managers, Data Scientists and others
  • Continually learn about the ever-evolving challenges and complexities of the cybersecurity industry
  • Have fun solving hard problems

Frontend DevelopmentGitHTMLCSSJavascript

Posted 1 day ago
Apply
Apply

📍 United States of America

đź’¸ 110000.0 - 190000.0 USD per year

🔍 Cybersecurity

  • 5+ years in Cybersecurity focused role.
  • Customer empathy and ability to guide customers towards desired outcome.
  • Excellent customer-facing communication skills including verbal and written.
  • Partner with CrowdStrike teams to troubleshoot and resolve customer issues.
  • Adept in Windows, Linux, and MAC operating systems.
  • Experience or demonstrated knowledge of threat detection and incident response.
  • Bachelor's degree in Technology and/or Cybersecurity or relevant experience.
  • Cybersecurity certifications from reputable organizations such as SANS, ISC2 or equivalent.
  • Fluent in Spanish or Portuguese
  • Assess customer’s Falcon environment and ensure alignment with Falcon Complete standards.
  • Provide Falcon Complete customers with recommendations that align to improved security.
  • Create and recommend remediation for components of CrowdStrike products that may lead to improved security posture.
  • Contact customers directly upon identification of misalignment with Falcon Complete standards.
  • Document, update, and resolve all customer related issues in accordance with established procedures and SLAs.
  • Develop and provide customers with service reports and stats as requested.
  • Partner with internal teams to ensure customer satisfaction.
  • Liaise with support team to help troubleshoot and coordinate efforts to resolve technical issues.

Cloud ComputingCybersecurityMac OS XMicrosoft SQL ServerCustomer serviceRESTful APIsLinuxCustomer Success

Posted 1 day ago
Apply
Shown 10 out of 47