At a Glance
- Tasks: Monitor security alerts and conduct in-depth analysis to protect organisations.
- Company: CrowdStrike is a global leader in cybersecurity, dedicated to stopping breaches since 2011.
- Benefits: Enjoy remote work flexibility, competitive pay, wellness programs, and professional development opportunities.
- Why this job: Join a mission-driven team that values innovation and makes a real impact on global security.
- Qualifications: Experience in incident handling, computer forensics, and systems administration is essential.
- Other info: CrowdStrike promotes a culture of belonging and equal opportunity for all employees.
The predicted salary is between 43200 - 72000 £ per year.
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About The Role
CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.
Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents? Are you self-motivated and looking for an opportunity to rapidly accelerate your skills? Do you crave new and innovative work that actually matters to your customer? Do you have an Incident Response or Information Security background that you’re not fully utilizing? Are you capable of leading teams and interacting well with customers? Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?
What You'll Do
- Conduct monitoring and perform in-depth analysis of security alerts.
- Exercise incident handling processes across Windows, Mac, and Linux platforms.
- Perform malware analysis.
- Perform remote remediation of malware or malicious activity.
- Develop and improve processes for incident detection, triage, and the execution of countermeasures.
- Produce high-quality written and verbal communications, recommendations, and findings to customer management.
- Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
- Manage internal programs or teams.
- Serve as the technical escalation point and mentor for lower-level analysts.
- Provide oversight and quality assurance for issues worked by lower-level analysts.
- Assist in the advancement of security processes and procedures.
What You'll Need
Successful candidates will have experience in one or more of the following areas:
- Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
- Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
- Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
- Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
- Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
- Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
Education
BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.
Bonus Points
- 4-6 years of relevant incident handling experience.
- At least one relevant security certification.
- Strong verbal and communication skills.
- Strong problem solving skills.
- Strong experience with Mac OS, Windows, and Unix operating systems.
- Ability to handle high pressure situations in a productive and professional manner.
- Strong time management skills with the ability to multi-task.
Benefits Of Working At CrowdStrike
- Remote-friendly and flexible work culture.
- Market leader in compensation and equity awards.
- Comprehensive physical and mental wellness programs.
- Competitive vacation and holidays for recharge.
- Paid parental and adoption leaves.
- Professional development opportunities for all employees regardless of level or role.
- Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections.
- Vibrant office culture with world class amenities.
- Great Place to Work Certified across the globe.
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Sr. Analyst, Falcon Complete (Remote, GBR) employer: CrowdStrike
Contact Detail:
CrowdStrike Recruiting Team
recruiting@crowdstrike.com
StudySmarter Expert Advice 🤫
We think this is how you could land Sr. Analyst, Falcon Complete (Remote, GBR)
✨Tip Number 1
Familiarise yourself with CrowdStrike's mission and values. Understanding their commitment to cybersecurity and innovation will help you align your responses during interviews, showcasing how your personal values resonate with theirs.
✨Tip Number 2
Brush up on your technical skills related to incident response and malware analysis. Being able to discuss specific tools and techniques you've used in past roles will demonstrate your hands-on experience and readiness for the challenges of the role.
✨Tip Number 3
Network with current or former CrowdStrike employees on platforms like LinkedIn. Engaging with them can provide insider insights about the company culture and expectations, which can be invaluable during your application process.
✨Tip Number 4
Prepare to discuss real-world scenarios where you've successfully handled incidents or led teams. Having concrete examples ready will help you illustrate your problem-solving skills and ability to thrive under pressure, which are crucial for this role.
We think you need these skills to ace Sr. Analyst, Falcon Complete (Remote, GBR)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in incident handling, computer forensic analysis, and malware analysis. Use specific examples that demonstrate your skills and achievements in these areas.
Craft a Compelling Cover Letter: Write a cover letter that reflects your passion for cybersecurity and your understanding of CrowdStrike's mission. Mention how your background aligns with the role and express your enthusiasm for contributing to their team.
Showcase Technical Skills: In your application, emphasise your technical skills, especially in programming/scripting languages like Python or Powershell. Provide examples of how you've used these skills in past roles to solve problems or improve processes.
Highlight Communication Abilities: Since the role requires producing high-quality written communications, include examples of reports or presentations you've created. This will demonstrate your ability to convey complex information clearly and effectively.
How to prepare for a job interview at CrowdStrike
✨Showcase Your Technical Skills
Make sure to highlight your hands-on experience with incident response, malware analysis, and systems administration. Be prepared to discuss specific tools and techniques you've used in past roles, as this will demonstrate your technical proficiency.
✨Prepare for Scenario-Based Questions
CrowdStrike may ask you to walk through how you would handle specific security incidents. Practise articulating your thought process and the steps you would take to detect, contain, and remediate threats. This shows your problem-solving skills and ability to think on your feet.
✨Emphasise Communication Skills
As a senior analyst, you'll need to communicate findings and recommendations clearly. Prepare examples of how you've effectively communicated complex technical information to non-technical stakeholders in the past. This will highlight your ability to bridge the gap between technical and business needs.
✨Demonstrate Your Passion for Cybersecurity
CrowdStrike values candidates who are genuinely passionate about cybersecurity. Share your personal projects, blogs, or any community involvement that showcases your commitment to the field. This can set you apart from other candidates and show that you're a good cultural fit.