At a Glance
- Tasks: Monitor and analyse security alerts, conduct incident handling, and perform malware analysis.
- Company: Join CrowdStrike, a leader in global security with a remote-friendly culture.
- Benefits: Enjoy competitive pay, wellness programs, flexible work, and professional development opportunities.
- Why this job: Make a real impact in cybersecurity while expanding your skills in a dynamic environment.
- Qualifications: Experience in incident handling, malware analysis, and programming; relevant degree or certification preferred.
- Other info: Great place to work with a vibrant culture and strong support for diversity and inclusion.
The predicted salary is between 28800 - 48000 £ per year.
Overview
CrowdStrike is looking for highly motivated, self-driven, technical senior analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time to protect our customers.
What You\’ll Do
- Conduct monitoring and perform in-depth analysis of security alerts using the CrowdStrike platform.
- Exercise incident handling processes across Windows, Mac, and Linux platforms.
- Perform malware analysis.
- Perform remote remediation of malware or malicious activity.
- Develop and improve processes for incident detection, triage, and the execution of countermeasures.
- Produce high-quality written and verbal communications, recommendations, and findings to customer management.
- Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
- Assist in the advancement of security processes and procedures.
What You\’ll Need
Successful candidates will have experience in one or more of the following areas:
- Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists.
- Computer Forensic Analysis: experience with forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
- Systems Administration: understanding of system internals to implement and execute countermeasures and remediation.
- Malware Analysis: ability to perform static and dynamic malware analysis.
- Incident Remediation: ability to create targeted remediation plans for compromised organizations.
- Programming/Scripting: experience coding in PowerShell, C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
- At least one relevant security certification.
- Strong verbal and written communication skills.
- Strong problem-solving skills.
- Strong experience with Mac OS, Windows, and Unix operating systems.
- Ability to handle high-pressure situations in a productive and professional manner.
- Strong time management skills with the ability to multitask.
- BA/BS or MA/MS degree in Computer Science, Computer Engineering, Math, Information Security or related fields, or suitable relevant work experience.
Benefits Of Working At CrowdStrike
- Remote-friendly and flexible work culture
- Market leader in compensation and equity awards
- Comprehensive physical and mental wellness programs
- Competitive vacation and holidays for recharge
- Paid parental and adoption leaves
- Professional development opportunities for all employees
- Employee Networks, geographic neighborhood groups, and volunteer opportunities
- Vibrant office culture with world-class amenities
- Great Place to Work Certified across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. If you need assistance accessing or reviewing the information on this website or need help submitting an application, please contact recruiting@crowdstrike.com for further assistance.
Seniority level
- Entry level
Employment type
- Full-time
Job function
- Business Development and Sales
Industries
- Computer and Network Security
London, England, United Kingdom 6 days ago
#J-18808-Ljbffr
Analyst I, Falcon Complete (Remote, GBR) employer: CrowdStrike
Contact Detail:
CrowdStrike Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Analyst I, Falcon Complete (Remote, GBR)
✨Tip Number 1
Network like a pro! Reach out to folks in the industry on LinkedIn or at events. A friendly chat can open doors that a CV just can't.
✨Tip Number 2
Show off your skills! Create a portfolio or a blog where you share your insights on security topics. This not only showcases your expertise but also demonstrates your passion for the field.
✨Tip Number 3
Prepare for interviews by practising common questions and scenarios related to incident handling and malware analysis. The more you rehearse, the more confident you'll feel when it’s showtime!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Analyst I, Falcon Complete (Remote, GBR)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Analyst I role. Highlight relevant experience in incident handling, malware analysis, and any programming skills you have. We want to see how your background aligns with what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cybersecurity and how your skills can contribute to our mission at CrowdStrike. Keep it engaging and personal – we love to see your personality!
Showcase Your Communication Skills: Since strong written communication is key for this role, make sure your application is clear and concise. Use proper grammar and structure, and don’t forget to proofread! We appreciate attention to detail.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the info you need about the role and our company culture there!
How to prepare for a job interview at CrowdStrike
✨Know Your Tools
Familiarise yourself with the CrowdStrike platform and any relevant forensic analysis tools. Being able to discuss your experience with these tools will show that you're not just a theoretical candidate but someone who can hit the ground running.
✨Showcase Your Incident Handling Skills
Prepare specific examples of past incidents you've handled, especially those involving advanced threats. Use the STAR method (Situation, Task, Action, Result) to structure your responses, making it clear how you approached the problem and what the outcome was.
✨Communicate Clearly
Since strong verbal and written communication skills are essential, practice explaining complex technical concepts in simple terms. You might be asked to present findings or recommendations, so being articulate will set you apart.
✨Demonstrate Your Passion for Security
Stay updated on the latest trends in cybersecurity and be ready to discuss them. Whether it's a recent malware outbreak or a new incident response strategy, showing your enthusiasm for the field can make a lasting impression.