Threat Analyst II (Remote, ROU) - Crowdstrike SRL
Aplică extern

Threat Analyst II (Remote, ROU)

Publicat 05.09.2024 | Expiră 30.11.2024

Descriere job

About the Role:

Our CrowdStrike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer- and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who has demonstrated experience involving detections and/or reverse engineering. The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with detections of potentially malicious behavior by machine learning models is a plus.

Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.


This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science

What You’ll Do:

  • Review current product detections to ensure they are performing to the company standard

  • Perform tasks to enable better-management of false positive detections

  • Analyze binary files to determine their legitimacy

  • Address internal questions and concerns regarding customer threat detections

  • Review Machine Learning predictions


What You’ll Need:

  • Exposure and understanding of different types and functionality of malware

  • General knowledge of reverse engineering malware, or malware operations

  • Fundamental understanding of attributes of binary files such as imports/exports and packers

  • Ability to demonstrate practical knowledge of research/collection skills and analytical methods

  • General understanding of threat/risk management and threat/risk assessment

  • Familiarity with various operating systems

  • Knowledge of one scripting language, Python, Bash or PowerShell

  • Ability to break down complex problems into workable components

  • Experience with threat detections by Machine Learning

  • BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field


Bonus Points:

  • Experience in a security operations center or similar environment responding to incidents

  • Good understanding of Windows OS internals and the Windows API

  • Knowledge of MacOS and/or Linux OS

  • Familiarity with tools used in targeted and criminal cyber-intrusions

  • A background in exploit and vulnerability analysis

  • Knowledge of programming C, C++, Java, assembly or GoLang

  • If you have experience in using a post-exploitation framework (for example Metasploit)

  • Splunk, SIEM or Elastic knowledge

  • MITRE ATT&CK Framework knowledge

#LI-Remote

#LI-JP2

#LI-EV1

Crowdstrike SRL

Crowdstrike SRL

16 anunțuri active

4.19

26 evaluări

Oportunități de avansare

Pachet salarial

Timp la birou vs. timp liber

Management

Proceduri și valori

Criterii job

Angajat Entry level (< 2 Ani)
Tip job Full-time
Orașe Remote