Active Defense Services Analyst (Remote, AUS)

6 Minutes ago • All levels

Job Summary

Job Description

CrowdStrike is seeking highly motivated, self-driven technical analysts for its Active Defense Service. This role involves detecting, analyzing, and remediating ongoing security incidents for global customers, helping them recover from advanced attackers. Candidates will expand their skill set through diverse experiences, focusing on finding and removing threats to ensure business continuity. The position is open for Analyst or Senior Analyst levels, determined by experience and technical knowledge, and is remote across Australia.
Must have:
  • Exercise incident handling and remediation processes across Windows, Mac, and Linux platforms.
  • Perform basic malware analysis.
  • Develop and improve processes for incident detection and the execution of countermeasures.
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Experience in Incident Handling, Computer Forensic Analysis, Systems Administration, Network Forensic Analysis, Malware Analysis, Incident Remediation, Network Operations and Architecture/Engineering.
  • Programming/Scripting experience in Python, PowerShell, .NET, C, C#, VB, Perl, Ruby on Rails.
  • Capable of completing technical tasks without supervision.
  • Strong project management skills.
  • Ability to effectively communicate with customers during ongoing security incidents.
Good to have:
  • BA or BS in Computer Science or a related field.
  • Industry related DFIR certifications.
  • Contributing thought leader within the incident response industry.
Perks:
  • Remote-friendly and flexible work culture
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe

Job Details

About The Role:

CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by helping customer organizations recover from the most advanced attackers in the world. Our Active Defense Service offers opportunities to expand your skill set through a wide variety of experiences detecting, analyzing, and remediating ongoing security incidents. Put simply, your job will be to find the bad guys, remove the bad guys, and keep them out so our customers can keep their business moving forward.

We are looking for Analyst or Senior Analyst candidates, which will be determined by experience and/or depth of technical knowledge.

Location: anywhere Australia remote, visa sponsorship not available

Am I an Analyst, Active Defense Services Candidate?

  • Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents?
  • Are you passionate about helping customers during their darkest hours?
  • Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
  • Do you crave new and innovative work that actually matters to your customer?
  • Do you have an Incident Response or Information Security background that you’re not fully utilizing?
  • Are you capable of leading teams and interacting well with customers?
  • Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?

What You'll Do:

  • Exercise incident handling and remediation processes across Windows, Mac, and Linux platforms.
  • Perform basic malware analysis.
  • Develop and improve processes for incident detection and the execution of countermeasures
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
  • Provide continuous feedback and solutions for operational collateral and capabilities

What You'll Need:

Successful candidates will have experience in one or more of the following areas:

  • Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware
  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in Python, PowerShell, or .NET, or the desire to learn, with experience coding in other languages such as C, C#, VB, Python, Perl, Ruby on Rails, etc

Additionally, all candidates must possess the following qualifications:

  • Capable of completing technical tasks without supervision.
  • Desire to grow and expand both technical and soft skills.
  • Strong project management skills.
  • Contributing thought leader within the incident response industry.
  • Ability to foster a positive work environment and attitude.
  • Desire and ability to effectively communicate with customers during ongoing security incidents.

Education:

If you have a BA or BS in a Computer Science, or a degree in a related field, that’s great! If you have industry related DFIR certifications, that’s also a plus. If you have none of these - show us what you’ve got, what you’re passionate about, and why you’d be a great fit for the team.

#LI-JC1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.

Similar Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Skill Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Jobs in Australia

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Category Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
View All Jobs

Get notified when new jobs are added by Crowd Strick

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug