About the Role
Our CrowdStrike Malware Research Center Investigations Team is looking for a Threat Analyst who is both customer- and team-focused.
This role will include both response and pro-active aspects.
This role will be perfect for anyone who is just starting or considering a career involving r everse engineering and detection.
The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets.
This team is focused on improving detection capability and eﬃciency through analysis of malware or other threat detections impacting our customer base.
Bring your passion for helping internal partners resolve questions about our threat detections and our detection capability.
Our goal for the Investigations team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Malware Research Center - including detection eﬃcacy and managing false positive detections.
This role will work most closely with internal teams such as Technical Account Managers and Security Response and it is placed in the Malware Research Center in Data Science.
Interviewing process : online
You can work anywhere from Romania.
Review current product detections to ensure they are performing to the company standard
Perform tasks to enable better-management of false positive detections
Analyze binary ﬁles to determine their legitimacy
Address internal questions and concerns regarding customer threat detections
What You’ll Need :
Exposure and understanding of different types and functionality of malware
Basic knowledge of reverse engineering malware, or malware operations
Fundamental understanding of attributes of binary ﬁles such as imports / exports and packers
Ability to demonstrate practical knowledge of research / collection skills and analytical methods
General understanding of threat / risk management and threat / risk assessment
Knowledge of programming and scripting languages, in particular Python
Familiarity with various operating systems
Ability to break down complex problems into workable components
Bonus points :
Experience in a security operations center or similar environment responding to incidents
Good understanding of Windows OS internals and the Windows API
Knowledge of MacOS and / or Linux
Familiarity with tools used in targeted and criminal cyber-intrusions
A background in exploit and vulnerability analysis
Knowledge of a variety of programming languages including C, C++, Java, and assembly
BA / BS or MA / MS degree or equivalent experience in Computer Science, Information Security, or a related ﬁeld
Benefits of Working at CrowdStrike :
Flexible work hours and remote friendly environment
Market leader in compensation and equity awards
Comprehensive health benefits
A variety of professional development and mentorship opportunities
Inclusive culture focused on people, customers and innovation
Working with the latest technologies
Open offices have stocked kitchens, coffee, soda and treats
Regular team activities, including happy hours and community service events