Incident Response Analyst

1 Week ago • 1-3 Years

Job Summary

Job Description

As an Incident Response Analyst, you will be at the forefront of cybersecurity, providing the first line of defense within the CSIRT. Your responsibilities include triaging incoming detections, enriching and investigating alerts, and taking rapid action to contain and remediate incidents. You will collaborate with experienced Incident Responders and contribute to continuous improvement within the security team. You will be diving into logs, endpoint telemetry, and more to uncover the scope and severity of an event, and work with a high-performing team to solve complex problems, and explain technical risks to stakeholders.
Must have:
  • 1-3 years of SOC experience in alert triage and incident handling.
  • Knowledge of Windows, macOS, and Linux internals and logging.
  • Solid grasp of TCP/IP, OSI layers, and common protocols.
  • Proficiency with search/query languages to investigate indicators.
Good to have:
  • Experience in scripting languages like Python or PowerShell.
  • Experienced SIEM power user conducting complex searches.
  • Experience assisting senior responders with IR functions.
  • Prior experience presenting technical findings to stakeholders.
Perks:
  • Remote-friendly and flexible work culture
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities
  • Employee Resource Groups and volunteer opportunities
  • Vibrant office culture with world class amenities

Job Details

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role

CrowdStrike is looking for a highly motivated, self-driven Incident Response Analyst to support the incident-response lifecycle—serving as the first line of defense within the CSIRT. In this role, you’ll triage incoming detections, enrich and investigate alerts, and take rapid action—live response, containment, or escalation—to keep adversaries at bay. You’ll work shoulder-to-shoulder with seasoned Incident Responders to drive continuous improvement across our world-class security team.

  • Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents?

  • Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?

  • Are you ready to dive into logs, endpoint telemetry, and more to uncover the scope and severity of an event?

  • Do you enjoy working around like-minded security professionals in a world class team who you can both learn from and mentor on a daily basis?

  • Are you looking for a role where the detections you fine-tune today will block tomorrow’s attacks?

  • Do you enjoy collaborating with a diverse, high-performing team and explaining technical risk to stakeholders who depend on your insights?
     

What You’ll Do:

  • Provide continuous coverage for SIEM/SOAR, EDR, network, cloud, and email-security consoles; rapidly validate alerts, enrich with context, suppress false positives, and act on confirmed threats.

  • Gather evidence from logs, host telemetry, and threat-intel feeds to determine scope, severity, and business impact.

  • Execute pre-approved playbook actions (host isolation, account disablement, phishing-email purge, firewall block, etc.) and confirm containment success.

  • Escalate high-severity or complex incidents to senior analysts/IR leadership, providing concise incident summaries and proposed mitigation steps while staying engaged through resolution.

  • Consistently meet or exceed response-time targets for critical and high-urgency tickets.

  • Record investigative steps, evidence, and decisions in the ticketing system; deliver clear shift-handoff notes to support 24x7 operations.

  • Identify noisy rules, false-positive trends, blind spots, or missing log sources; collaborate on custom detections and log-source onboarding to improve alert fidelity.

  • Participate in the refinement of existing runbooks, draft new ones, and champion automation opportunities that reduce analyst toil.

What You’ll Need:

  • 1–3 years of hands-on SOC experience performing alert triage, incident handling, and first-responder containment while working daily with SIEM/SOAR, EDR, IDS/IPS, firewalls/proxies, email-security tools, and deep log analysis.

  • Practical knowledge of Windows, macOS, and Linux internals and logging (Event Logs, Sysmon, auditd, etc.).

  • Solid grasp of TCP/IP, OSI layers, and common protocols (HTTP/S, DNS, SMTP); able to interpret packet captures and network logs.

  • Proficiency with search/query languages (LQL, SPL, KQL, SQL etc.) to enrich alerts and investigate indicators, mapping findings to MITRE ATT&CK techniques.

  • Demonstrated experience responding to hacktivist, cyber-crime, or APT activity—triage, containment, escalation, and thorough documentation.

  • Capable of completing technical tasks independently, maintaining composure during incident response actions, and fostering a positive, collaborative work environment.

  • Strong verbal and written communication, analytical problem-solving, time-management, and project-management skills; desire to grow and continuously improve both technical and soft skills.

Bonus Points:

  • Experience in scripting languages such as in Python, PowerShell, Bash, Perl, etc.; experience contributing to SOAR playbooks.

  • Experienced SIEM power user comfortable with conducting complex searches, creating dashboards, and providing alert tuning recommendations.

  • Experience assisting senior responders with coordinated IR functions, root-cause analysis, and tactical/strategic remediation planning.

  • Prior experience presenting technical findings and risk to non-technical stakeholders and executive leadership; project-management experience is a plus.

Education:

  • A bachelor’s or master’s degree in Computer Science, Cybersecurity, or a related field is welcome —but not required. Candidates who can demonstrate equivalent, hands-on experience in security operations will receive full consideration.

  • Applicable security certifications (e.g., GCIA, GCIH, GCFA, GNFA).

#LI-Remote

#LI-EV1

#LI-AL1

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.

Similar Jobs

Nasdaq - Data Engineering Senior Specialist

Nasdaq

Bengaluru, Karnataka, India (On-Site)
4 Weeks ago
Ion - IT/Cyber Security Analyst

Ion

London, England, United Kingdom (On-Site)
7 Months ago
Adtran - Senior Software Engineer

Adtran

Dallas, Texas, United States (On-Site)
3 Weeks ago
hogarth - Freelance Front End Developer

hogarth

Buenos Aires, Buenos Aires, Argentina (On-Site)
3 Days ago
The Embassy VFX - Pipeline TD

The Embassy VFX

Vancouver, British Columbia, Canada (Hybrid)
3 Months ago

Get notifed when new similar jobs are uploaded

Similar Skill Jobs

Glocomms - Security Engineering Manager

Glocomms

New York, New York, United States (On-Site)
1 Month ago
Krafton - Publishing Tech PM (3+ years experience)

Krafton

Seoul, South Korea (On-Site)
1 Month ago
Redhorse Corp - Data Engineer

Redhorse Corp

Herndon, Virginia, United States (On-Site)
4 Weeks ago
NVIDIA - Senior Site Reliability Engineer - AI Research Clusters

NVIDIA

Pune, Maharashtra, India (On-Site)
1 Month ago
Toppan Merrril - Senior DevOps Engineer

Toppan Merrril

Chennai, Tamil Nadu, India (On-Site)
1 Month ago
AnyDesk - Operations Engineer / Linux Administrator

AnyDesk

Stuttgart, Baden-Württemberg, Germany (On-Site)
2 Weeks ago
Motive - Technical Support Engineer

Motive

(Remote)
1 Month ago
Capgemini - Site Reliability Engineer

Capgemini

Pune, Maharashtra, India (On-Site)
4 Weeks ago
Wind River Jobs - Senior Engineer - Cloud

Wind River Jobs

Bengaluru, Karnataka, India (On-Site)
1 Week ago
Synamedia - Software Engineer (Node JS, GoLang, AWS)

Synamedia

Bengaluru, Karnataka, India (On-Site)
8 Months ago

Get notifed when new similar jobs are uploaded

Jobs in Romania

Crowd Strick - Sr. Software Engineer

Crowd Strick

Romania (Remote)
1 Week ago
endava - Accounts Receivable Accountant - Credit & Collections

endava

Cluj-Napoca, Cluj County, Romania (On-Site)
1 Week ago
Funcom - DevOps Engineer - Internship

Funcom

Bucharest, Bucharest, Romania (On-Site)
1 Month ago
endava - Senior Database Administrator

endava

Iași, Iași County, Romania (On-Site)
1 Week ago
Marsh McLennan - Mergers & Acquisitions Product Manager

Marsh McLennan

Cluj-Napoca, Cluj County, Romania (Hybrid)
4 Weeks ago
logifuture - C# Tech Lead

logifuture

Bucharest, Bucharest, Romania (Hybrid)
2 Months ago
Playtika - R&D Team Leader

Playtika

Romania (Hybrid)
7 Months ago
Ubisoft - Senior Level Designer

Ubisoft

Bucharest, Bucharest, Romania (Hybrid)
1 Month ago
Every matrix - Middle QA Tester

Every matrix

Bucharest, Bucharest, Romania (Hybrid)
1 Month ago
hogarth - Software Architect

hogarth

Bucharest, Bucharest, Romania (Hybrid)
1 Week ago

Get notifed when new similar jobs are uploaded

Similar Category Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.

United Kingdom (Remote)

Pune, Maharashtra, India (Remote)

Sydney, New South Wales, Australia (On-Site)

Paris, Île-de-France, France (Remote)

United Kingdom (Remote)

View All Jobs

Get notified when new jobs are added by Crowd Strick

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug