At a Glance
- Tasks: Join us to build cutting-edge detection tools and protect against cyber threats.
- Company: CrowdStrike, a leader in cybersecurity with a mission-driven culture.
- Benefits: Competitive pay, wellness programmes, flexible work, and professional growth opportunities.
- Why this job: Make a real impact in cybersecurity while working with innovative technologies.
- Qualifications: 5+ years in detection engineering or related fields, with strong technical skills.
- Other info: Dynamic team environment with mentorship opportunities and career advancement.
The predicted salary is between 36000 - 60000 £ per year.
Join to apply for the Detection Engineer, Falcon Complete role at CrowdStrike. As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform.
About The Role
The CrowdStrike Managed Services team offers opportunities to expand your skill set through a wide variety of experiences building detection rules, tools, and infrastructure supporting Falcon Complete Next‑Gen SIEM. As a Sr. Detection Engineer on the Falcon Complete team, you will be responsible for collaborating with internal CrowdStrike teams to create high fidelity detections based on both CrowdStrike and third‑party telemetry to enable the Falcon Complete Next‑Gen MDR team. The ideal candidate will demonstrate high competency in technical skills aimed at delivering value for customers and providing a successful experience with Falcon Complete.
What You’ll Do
- Perform threat research and threat hunting to identify emerging tactics, techniques, and procedures (TTPs) to build detection requirements using an intelligence driven approach.
- Develop, test, and deploy actionable high fidelity CrowdStrike Next‑Gen SIEM detection rules to enable a world‑class Managed Detection and Response team.
- Perform code reviews and testing to ensure high quality and high fidelity detection rules.
- Leverage CI/CD best practices and principles to deploy detection rule logic at scale.
- Collaborate with Security Analysts to create playbooks for triage and response for actionable high fidelity detections.
- Collaborate with SIEM architects to develop and define best practices for parsing data and normalizing data to a common event schema.
- Build and maintain utilities and tools to enable the managed services team to operate quickly and at a large scale.
- Provide feedback to and work with product management and engineering on improving detection pipelines.
- Develop and maintain processes and documentation.
- Participate in a Detection Engineer handler rotation.
- Mentor junior team members and lead projects at the Falcon Complete organization level.
What You’ll Need
- 5+ years of experience as a detection engineer, security engineer, security analyst, threat intelligence analyst, or related field.
- Knowledge of current cyber threats and how to detect them using SIEM and relevant technologies.
- Knowledge of parsing standards.
- Relevant industry certifications (i.e. GCFA, GCDA, GCIH, etc.).
- Experience with analyzing large datasets across a variety of vendors.
- Experience working with SIEM solutions (LogScale, Splunk, SumoLogic, Sentinel, QRadar, LogRhythm, etc).
- Proven ability to write code and leverage regular expressions.
- Ability to effectively communicate, mentor and tutor.
Benefits Of Working At CrowdStrike
- Market leader in compensation and equity awards.
- Comprehensive physical and mental wellness programs.
- Competitive vacation and holidays for recharge.
- Paid parental and adoption leaves.
- Professional development opportunities for all employees regardless of level or role.
- Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
- Vibrant office culture with world class amenities.
- Great Place to Work Certifiedâ„¢ across the globe.
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed.
Detection Engineer, Falcon Complete (Remote, GBR) employer: CrowdStrike
Contact Detail:
CrowdStrike Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Detection Engineer, Falcon Complete (Remote, GBR)
✨Tip Number 1
Network like a pro! Reach out to current CrowdStrike employees on LinkedIn or other platforms. Ask them about their experiences and any tips they might have for landing the Detection Engineer role. Personal connections can make a huge difference!
✨Tip Number 2
Prepare for the interview by brushing up on your technical skills. Make sure you can discuss your experience with SIEM solutions and detection rules confidently. We want to see your passion for cybersecurity shine through!
✨Tip Number 3
Showcase your problem-solving skills during the interview. Be ready to tackle hypothetical scenarios related to threat detection and response. This is your chance to demonstrate how you think on your feet!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows you’re genuinely interested in joining the CrowdStrike mission. Let’s get you on board!
We think you need these skills to ace Detection Engineer, Falcon Complete (Remote, GBR)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Detection Engineer role. Highlight relevant experience, especially in threat research and SIEM technologies. We want to see how your skills align with what we do at CrowdStrike!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and how you can contribute to our mission. Let us know why you're excited about the Falcon Complete team and what makes you a great fit.
Showcase Your Technical Skills: Don’t hold back on showcasing your technical prowess! Mention specific tools and technologies you've worked with, like LogScale or Splunk. We love seeing candidates who can demonstrate their hands-on experience.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s straightforward and ensures your application goes directly to us. Plus, it shows you’re serious about joining our team!
How to prepare for a job interview at CrowdStrike
✨Know Your Stuff
Make sure you brush up on your knowledge of current cyber threats and detection techniques. Familiarise yourself with SIEM solutions like Splunk or QRadar, as well as parsing standards. Being able to discuss these topics confidently will show that you're serious about the role.
✨Showcase Your Experience
Prepare specific examples from your past work where you've developed high-fidelity detection rules or performed threat hunting. Use the STAR method (Situation, Task, Action, Result) to structure your answers, making it easy for the interviewer to see your impact.
✨Ask Smart Questions
Interviews are a two-way street! Prepare insightful questions about CrowdStrike's approach to threat detection and how the team collaborates. This not only shows your interest but also helps you gauge if the company culture aligns with your values.
✨Be Ready to Code
Since coding is a key part of the role, be prepared for technical assessments. Brush up on your coding skills and be ready to demonstrate your ability to write detection rules or use regular expressions. Practising common coding challenges can help you feel more confident.