CrowdStrike Logo

CrowdStrike

Threat researcher III (Remote, IND)

Posted 4 Days Ago
Be an Early Applicant
Remote
15 Locations
Senior level
Remote
15 Locations
Senior level
The Threat Analyst will analyze malware threats by validating their behavior and effectiveness against Falcon's defenses. Responsibilities include reverse engineering threats, creating Sandbox signatures, and improving detection systems while communicating technical details clearly. The role focuses on proactive threat understanding within a team-oriented environment in cybersecurity.
The summary above was generated by AI

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About Product Group

The CrowdStrike Malware Research Center is the core of Falcon’s malware detection and response capabilities. The team has a focus on understanding the threat landscape and sets the target for what Falcon should be identifying and preventing. Additionally, the MRC is responsible for understanding our capabilities, and mapping how well our machine learning and behavioral protection capabilities are doing against those threats. Where there is a gap, the MRC takes action to improve our detection stance, and improve our overall protection story. There are many parts of CrowdStrike working towards protecting customer environments, and the MRC works across all of them to ensure we are on target and providing the best protection for our current threat landscape.

Threat Research Team

Leading the charge for understanding the activity of malware today is the Threat Research team. With a focus on malware research, the primary role of the team is to understand relevant threats and techniques used in malware that are threatening our customer’s business. The challenge is the enormous scale of malware today and sheer number of samples required to be addressed. This takes a more creative approach than traditional Anti-Virus research, focusing on one sample at a time. The modern threat lab requires an economy of scale through automation and machine learning to allow people to focus on new learnings, and let systems continue to identify malware based on what the team has learned.

About the Role

The Threat Analyst will take input from many sources and validate if those threats are something Falcon can mount an effective defense against. The analysis can range from simple execution and review of the behaviors to reverse engineering. As Falcon is first a behavior based system, understanding how the threat is working and what it is doing to interact with the host environment can be important. The Threat Analyst will be expected to use the appropriate technique to efficiently understand the threat to identify how to best mitigate it. The Threat Analyst will be working on creating new Sandbox signatures and help to improve Sandbox detections.

Additionally, this role will be looked on as the go to person when new threats are reported for understanding those threats and formulating an opinion on how we should be thinking about the threat. Leaning on a proven track record of threat analysis, the successful candidate will be comfortable working to focus on the appropriate threats and clearly communicating key technical details of those threats.

As the gateway to the response organization for many new threats, good cross team collaboration skills are important. Clear, effective communication of technical details in a means which is actionable is the key to success.

Another aspect of the position is working with the engineering team to define automation improvements and process automation to reduce time and manual effort in the analysis of threats. Like communicating the threat details, prioritizing automation tasks and features will help define success of the role. Being able to understand the bigger picture of threat analysis and convey that to the engineering team which may not be familiar with the process will be required. The team will look to the successful candidate to help define and prioritize the roadmap for analysis automation. These are the tools and systems which will ultimately automate manual data collection so more time can be spent on understanding the threat.

What You'll Need

  • Bachelors or Masters in Computer Science or comparable field required.

  • 6+ year’s experience in the threat research field with a focus on malware analysis.

  • A proven background in reverse engineering on file-based threats, exploits, and other attack techniques are desirable to be demonstrated at a moderate skill level.

  • A reasonable level of proficiency in disassembly.  To operate at the level required to disassemble, core principles of structured programming is required

  • Expert level familiarity with at least one major Operating System is required as a behavior based system requires in-depth knowledge of how the host OS appears, as opposed to how the end user sees it.

  • A working knowledge of using MITRE ATT&CK to describe threat behaviors

  • The Threat Research team is supported by an engineering team, but proof of concept automation is produced by researchers. Showing competence handing off research to engineering to produce results and ability to produce small code projects to address immediate needs.

  • Strong interpersonal communications skills, with the ability to demonstrate leadership and team building expertise.

  • Experience with Malware Sandboxing technology like Cuckoo Sandbox  is a plus.

#LI-VJ1

#LI-HM1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Similar Jobs at CrowdStrike

Be an Early Applicant
4 Days Ago
15 Locations
Remote
10,000 Employees
Senior level
10,000 Employees
Senior level
Cloud • Information Technology • Sales • Security • Cybersecurity
As a Vulnerability Researcher III, you will analyze and gather data on various security vulnerabilities, including zero-day vulnerabilities, enhance the security vulnerability database, automate tasks, and troubleshoot existing issues. You will use programming skills to develop scripts, validate vulnerability data, and handle customer escalations regarding vulnerabilities.
4 Days Ago
15 Locations
Remote
10,000 Employees
Mid level
10,000 Employees
Mid level
Cloud • Information Technology • Sales • Security • Cybersecurity
As a Manual QA Engineer at CrowdStrike, you will execute manual test cases, manage test operations using Jenkins, analyze test failures, and collaborate with teams to ensure product functionality and quality. You will contribute to process improvements and report on testing outcomes.
4 Days Ago
15 Locations
Remote
10,000 Employees
Mid level
10,000 Employees
Mid level
Cloud • Information Technology • Sales • Security • Cybersecurity
The Software Development Engineer in Test (SDET) will develop and maintain automated test frameworks, implement testing for performance and reliability, collaborate with cross-functional teams, participate in code reviews, and manage CI pipelines to ensure robust product performance and reliability.

What you need to know about the Calgary Tech Scene

Employees can spend up to one-third of their life at work, so choosing the right company is crucial, not just for the job itself but for the company culture as well. While startups often offer dynamic culture and growth opportunities, large corporations provide benefits like career development and networking, especially appealing to recent graduates. Fortunately, Calgary stands out as a hub for both, recognized as one of Startup Genome's Top 100 Emerging Ecosystems, while also playing host to a number of multinational enterprises. In Calgary, job seekers can find a wide range of opportunities.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account