Apply

Sr. Analyst, Falcon Complete (Remote, GBR)

Posted 3 months agoViewed

View full description

💎 Seniority level: Middle, 4-6 years of relevant incident handling experience

📍 Location: GBR

🔍 Industry: Cybersecurity

🏢 Company: CrowdStrike👥 5001-10000💰 $4,600,000 Post-IPO Equity about 2 years agoComputer and Network Security

🗣️ Languages: English

⏳ Experience: 4-6 years of relevant incident handling experience

🪄 Skills: LeadershipPythonCybersecurityRubyRuby on RailsC#Communication SkillsCollaboration

Requirements:
  • Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and.NET.
Responsibilities:
  • Conduct monitoring and perform in-depth analysis of security alerts.
  • Exercise incident handling processes across Windows, Mac, and Linux platforms.
  • Perform malware analysis.
  • Perform remote remediation of malware or malicious activity.
  • Develop and improve processes for incident detection, triage, and the execution of countermeasures.
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
  • Manage internal programs or teams.
  • Serve as the technical escalation point and mentor for lower-level analysts.
  • Provide oversight and quality assurance for issues worked by lower-level analysts.
  • Assist in the advancement of security processes and procedures.
Apply