Treceți la conținutul principal
Publicați CV-ul dvs. - Durează doar câteva secunde

it analyst locuri de muncă în Bistriţa

Sortati dupa: -
0 locuri de muncă

Job Post Details

Sr. Threat Researcher (Remote) - job post

CrowdStrike
3.5 out of 5
Romania
Cu normă întreagă
Creați un cont Indeed înainte de a continua pe site-ul web al companiei.

Detaliile locului de muncă

Iată cum se potrivesc detaliile locului de muncă cu profilul dvs.

Tipul locului de muncă

  • Cu normă întreagă

Locație

Romania

Descriere completă a locului de muncă

#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.
About the Role:
The CrowdStrike Malware Research Center is the core of Falcon’s malware detection and response capabilities. The team has a focus on understanding the threat landscape and sets the target for what Falcon should be identifying and preventing.
Additionally, the MRC is responsible for understanding our capabilities, and mapping how well our machine learning and behavioral protection capabilities are doing against those threats. Where there is a gap, the MRC takes action to improve our detection stance, and improve our overall protection story. MRC also performs pathfinding research to enable technology development using innovation, prototyping and bleeding edge machine learning to support our flagship Falcon product. There are many parts of CrowdStrike working towards protecting customer environments, and the MRC works across all of them to ensure we are on target and providing the best protection for our current Threat landscape.
Leading the charge for understanding the activity of malware today is the Threat Research team. With a focus on malware research, the primary role of the team is to understand relevant threats and techniques used in malware that are threatening our customer’s business.
The challenge is the enormous scale of malware today and sheer number of samples required to be addressed. This takes a more creative approach than traditional antivirus research, focusing on one sample at a time. The modern threat lab requires an economy of scale through automation and machine learning to allow people to focus on new learnings, and let systems continue to identify malware based on what the team has learned.

What You’ll Do:
The Threat Analyst will take input from many sources and validate if those threats are something Falcon can mount an effective defense against. The analysis can range from simple execution and review of the behaviors to reverse engineering. As Falcon is first a behavior-based system, understanding how the threat is working and what it is doing to interact with the host environment can be important.
The Threat Analyst will be expected to use the appropriate technique to efficiently understand the threat to identify how to best mitigate it.
Additionally, this role will be looked on as a subject matter expert when new threats are reported for understanding those threats and formulating an opinion on how we should be thinking about the threat. Leaning on a proven track record of threat analysis, the successful candidate will be comfortable working to focus on the appropriate threats and clearly communicating key technical details of those threats.
As part of the role, you might engage with certification partners to articulate and communicate threat trends and how those are reflected in our detection capability. Experience working with certification partners like AV-Test, AV-Comparatives, SE Labs, and MITRE is a plus.
As the gateway to the response organization for many new threats, good cross team collaboration skills are important. Clear, effective communication of technical details in a means which is actionable is the key to success. This would also involve collaborating on creating thought leadership content (both internal and public-facing) related to key findings in threat research.
Another aspect of the position is working with the engineering team to define automation improvements and process automation to reduce time and manual effort in the analysis of threats. Like communicating the threat details, prioritizing automation tasks and features will help define success of the role. Being able to understand the bigger picture of threat analysis and convey that to the engineering team which may not be familiar with the process will be required. The team will look to the successful candidate to help define and prioritize the roadmap for analysis automation. These are the tools and systems which will ultimately automate manual data collection so more time can be spent on understanding the threat.

What You’ll Need:
  • Bachelors or master’s and 5+ years of industry experience in information security or comparable field required (10+ years of experience in the threat research field).
  • Skilled in reverse engineering around file-less threats, exploits, and other attack techniques
  • Familiarity with attacks on containers and public cloud services is a plus, but not required.
  • A working knowledge of using MITRE ATT&CK to describe threat behaviors.
  • The Threat Research team is supported by an engineering team, but proof of concept automation is produced by researchers. Showing competence handing off research to engineering to produce results and ability to produce proof-of-concept projects to address immediate needs.
  • Expert level familiarity with at least one major Operating System is required as a behavior-based system requires in-depth knowledge of how the host OS appears.
  • Ability to work with large data sets, such as Splunk, ElasticSearch-Kibana or similar tools is a must.
  • Strong interpersonal communications skills, with the ability to demonstrate leadership and team building expertise.
  • Strong technical writing skills, and an ability to communicate effectively, crisply and with impact is required.
#LI-EV1
#LI-Remote
Benefits of Working at CrowdStrike:
  • Remote-first culture
  • Market leader in compensation and equity awards with option to participate in ESPP in eligible countries
  • Competitive vacation and flexible working arrangements
  • Physical and mental wellness programs
  • Paid parental leave, including adoption
  • A variety of professional development and mentorship opportunities
  • Access to CrowdStrike University, LinkedIn Learning and Jhanna
  • Offices with stocked kitchens when you need to fuel innovation and collaboration
  • Birthday time-off in your local country
  • Work with people who are passionate in our mission and Great Place to Work certified across the globe
We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact
Recruiting@crowdstrike.com
, for further assistance.
Candidați cu ușurință la locuri de muncăPublicați CV-ul dvs.