Enable job alerts via email!

Reverse Engineer, Threat Research Engineering (Remote)

CrowdStrike

United States

Remote

USD 80,000 - 140,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking cybersecurity leader where your expertise in malware analysis and reverse engineering will be pivotal in enhancing security measures. As part of a dynamic team, you will analyze emerging threats and develop strategies to counteract adversaries, contributing to the safety of organizations worldwide. This role offers a unique opportunity to work with cutting-edge technology in a supportive and inclusive environment. You'll be part of a mission-driven culture that values innovation and collaboration, ensuring that your contributions make a real difference in the fight against cyber threats. Ready to take on the challenge?

Benefits

Remote-friendly work culture
Market leader in compensation
Comprehensive wellness programs
Competitive vacation and holidays
Paid parental and adoption leaves
Professional development opportunities
Employee Resource Groups
Vibrant office culture
Volunteer opportunities

Qualifications

  • 4+ years of experience in malware analysis and reverse engineering.
  • Proficiency in static and behavioral analysis of malware.

Responsibilities

  • Analyze adversary malware and exploits to enhance detection capabilities.
  • Document findings and collaborate with teams to improve platform resilience.

Skills

Malware Analysis
Reverse Engineering
Static and Behavioral Analysis
YARA Rules Writing
Understanding of OS Internals
Knowledge of Threat Landscape

Education

Bachelor's Degree in Computer Science or related field

Tools

Sandboxing Tools
Debuggers

Job description

CrowdStrike

CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform for protecting endpoints, cloud workloads, identities, and data.

As a global leader in cybersecurity, CrowdStrike protects the people, processes, and technologies that drive modern organizations. Our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe, and their lives moving forward. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation, and a fanatical commitment to our customers, our community, and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

Malware Research Center:

CrowdStrike’s Malware Research Center (MRC) is at the core of Falcon’s malware detection and response capabilities. As an MRC team member, you'll analyze the threat landscape and drive improvements to our machine learning and behavioral protection capabilities. Where there is a gap, MRC takes action to improve our detection stance and protection story. Help us stop breaches with your expertise.


About the Role:

As a member of CrowdStrike’s GovCloud Threat Research Engineering team, you will ensure our Falcon platform keeps pace with the evolving threat landscape. You will analyze the latest malware and threats to assist our detection engineering efforts. Your analysis will help us develop signatures to counter adversaries, report key technical details, and improve our detections.


What You’ll Do:

  1. Analyze adversary malware and exploits.
  2. Document your findings and communicate key technical details to stakeholders.
  3. Conduct in-depth research on emerging threat actor TTPs and trends.
  4. Collaborate with counterparts across CrowdStrike to improve the platform’s resilience.


What You’ll Need:

  1. 4+ years of malware analysis and reverse engineering experience.
  2. A proven background in reverse engineering on file-based threats, exploits, and other attack techniques.
  3. Proficiency in static and behavioral analysis of malware.
  4. Understanding of sandbox and debugger evasion techniques.
  5. Experience writing YARA rules.
  6. Familiarity with operating system internals for at least one major OS.
  7. Knowledge of the threat landscape.
  8. US Citizen or Green Card Holder.


Bonus Points:

  1. Threat detection and response experience.
  2. Experience with blue teams or SOC.


Benefits of Working at CrowdStrike:

  1. Remote-friendly and flexible work culture.
  2. Market leader in compensation and equity awards.
  3. Comprehensive physical and mental wellness programs.
  4. Competitive vacation and holidays for recharge.
  5. Paid parental and adoption leaves.
  6. Professional development opportunities for all employees regardless of level or role.
  7. Employee Resource Groups, geographic neighbourhood groups, and volunteer opportunities to build connections.
  8. Vibrant office culture with world-class amenities.

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning, and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

CrowdStrike participates in the E-Verify program.

Notice of E-Verify Participation

Right to Work

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.