Enable job alerts via email!

Sr. Analyst, Falcon Complete (Remote)

CrowdStrike

Shefford

Remote

GBP 40,000 - 70,000

Full time

Yesterday
Be an early applicant

Job summary

A global leader in cybersecurity is seeking technical analysts to protect organizations against advanced cyber threats. The ideal candidates will have backgrounds in incident handling, forensic analysis, and systems administration. Responsibilities include conducting security monitoring, incident management, and mentoring junior analysts. This role offers a remote-friendly culture and the chance to advance your skills in a dynamic environment.

Benefits

Remote-friendly and flexible work culture
Market leader in compensation and equity awards
Comprehensive wellness programs
Competitive vacation and holidays
Paid parental and adoption leaves
Professional development opportunities
Employee Networks and volunteer opportunities
Vibrant office culture with world-class amenities

Qualifications

  • Experience conducting or managing incident response.
  • Background using forensic analysis tools.
  • Understanding of system internals.
  • Knowledge of network protocols and analysis tools.
  • Ability to perform static and dynamic malware analysis.
  • Strong understanding of targeted attacks.
  • Understanding of secure network architecture.
  • Experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and .NET.

Responsibilities

  • Conduct monitoring and perform in-depth analysis of security alerts.
  • Exercise incident handling processes across platforms.
  • Perform malware analysis and remote remediation.
  • Develop and improve incident detection processes.
  • Produce high-quality written communications.
  • Manage internal programs and serve as a mentor.

Skills

Incident Handling
Computer Forensic Analysis
Systems Administration
Network Forensic Analysis
Malware Analysis
Incident Remediation
Network Operations and Architecture
Programming/Scripting

Education

BA or BS / MA or MS in Computer Science or related field
Job description

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission‑driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role

CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real‑time for our customers.

  • Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents?
  • Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
  • Do you crave new and innovative work that actually matters to your customer?
  • Do you have an Incident Response or Information Security background that you’re not fully utilizing?
  • Are you capable of leading teams and interacting well with customers?
  • Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?
What You'll Do
  • Conduct monitoring and perform in-depth analysis of security alerts.
  • Exercise incident handling processes across Windows, Mac, and Linux platforms.
  • Perform malware analysis.
  • Perform remote remediation of malware or malicious activity.
  • Develop and improve processes for incident detection, triage, and the execution of countermeasures.
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
  • Manage internal programs or teams.
  • Serve as the technical escalation point and mentor for lower-level analysts.
  • Provide oversight and quality assurance for issues worked by lower-level analysts.
  • Assist in the advancement of security processes and procedures.
What You'll Need

Successful candidates will have experience in one or more of the following areas:

  • Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
  • Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
Education

BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.

Bonus Points
  • 4‑6 years of relevant incident handling experience
  • At least one relevant security certification
  • Strong verbal and communication skills
  • Strong problem solving skills
  • Strong experience with Mac OS, Windows, and Unix operating systems.
  • Ability to handle high‑pressure situations in a productive and professional manner.
  • Strong time management skills with the ability to multi‑task
Benefits of Working at CrowdStrike
  • Remote‑friendly and flexible work culture
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions— including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay‑offs, return from lay‑off, terminations and social/recreational programs— on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.