At a Glance
- Tasks: Monitor and analyse security alerts, conduct incident response, and perform malware analysis.
- Company: Join CrowdStrike, a global leader in cybersecurity with a mission to stop breaches.
- Benefits: Competitive pay, wellness programmes, generous leave, and professional development opportunities.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology and a passionate team.
- Qualifications: Experience in incident handling, computer forensics, and programming/scripting skills required.
- Other info: Dynamic remote work environment with excellent career growth and a culture of belonging.
The predicted salary is between 40000 - 50000 £ per year.
About the Role: As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
Interview Questions:
- Do you find yourself interested in putting your hands-on technical skills to the test in detecting, containing, and remediating incidents?
- Do you want to respond to incidents of all severities and fight back against adversaries big and small?
- Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
- Do you crave new and innovative work that actually matters to your customer?
- Do you have an Incident Response or Information Security background that you’re not fully utilizing?
- Are you capable of contributing to a diverse team and interacting well with customers?
- Do you love working around like-minded people in a world class team who you can both learn from and mentor on a daily basis?
What You’ll Do:
- Conduct monitoring and perform in-depth analysis of security alerts using the CrowdStrike platform.
- Exercise incident handling processes across Windows, Mac, and Linux platforms.
- Perform malware analysis.
- Perform remote remediation of malware or malicious activity.
- Develop and improve processes for incident detection, triage, and the execution of countermeasures.
- Produce high-quality written and verbal communications, recommendations, and findings to customer management.
- Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
- Assist in the advancement of security processes and procedures.
What You’ll Need:
- Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
- Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
- Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
- Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
- Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
- Programming/Scripting: experience coding in Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
- At least one relevant security certification.
- Strong verbal and communication skills.
- Strong problem-solving skills.
- Strong experience with Mac OS, Windows, and Unix operating systems.
- Ability to handle high pressure situations in a productive and professional manner.
- Strong time management skills with the ability to multitask.
- BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or suitable relevant work experience.
Benefits of Working at CrowdStrike:
- Market leader in compensation and equity awards.
- Comprehensive physical and mental wellness programs.
- Competitive vacation and holidays for recharge.
- Paid parental and adoption leaves.
- Professional development opportunities for all employees regardless of level or role.
- Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
- Vibrant office culture with world class amenities.
- Great Place to Work Certifiedâ„¢ across the globe.
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
Analyst I, Falcon Complete (Remote) in Shefford employer: CrowdStrike
Contact Detail:
CrowdStrike Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Analyst I, Falcon Complete (Remote) in Shefford
✨Tip Number 1
Get your networking game on! Connect with professionals in the cybersecurity field on platforms like LinkedIn. Join relevant groups and participate in discussions to showcase your passion and knowledge.
✨Tip Number 2
Prepare for those interviews by practising common questions related to incident response and malware analysis. We recommend doing mock interviews with friends or using online resources to boost your confidence.
✨Tip Number 3
Show off your skills! Create a portfolio that highlights your projects, especially any hands-on experience with incident handling or malware analysis. This can really set you apart from other candidates.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, it shows you’re genuinely interested in joining the CrowdStrike team.
We think you need these skills to ace Analyst I, Falcon Complete (Remote) in Shefford
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter for the Analyst I role. Highlight your relevant experience in incident response and cybersecurity, and don’t forget to mention any specific tools or programming languages you’re familiar with that match the job description.
Showcase Your Skills: Use your written application to demonstrate your technical skills and problem-solving abilities. Include examples of past incidents you've handled or projects you've worked on that showcase your expertise in malware analysis and incident remediation.
Be Clear and Concise: When writing your application, keep it clear and to the point. Use straightforward language and avoid jargon unless it's relevant. This will help us quickly understand your qualifications and how you can contribute to our mission.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the details about the role and our company culture there!
How to prepare for a job interview at CrowdStrike
✨Know Your Cybersecurity Basics
Before the interview, brush up on your knowledge of incident response and malware analysis. Be ready to discuss specific tools you've used and how they relate to the CrowdStrike platform. This shows you're not just familiar with the concepts but can apply them practically.
✨Showcase Your Problem-Solving Skills
Prepare examples of past incidents you've handled, focusing on your problem-solving approach. Highlight how you triaged issues and implemented countermeasures. This will demonstrate your ability to think critically under pressure, which is crucial for the Analyst I role.
✨Communicate Clearly and Confidently
Since strong verbal communication skills are essential, practice explaining complex technical concepts in simple terms. You might be asked to present findings or recommendations, so being articulate will set you apart from other candidates.
✨Emphasise Team Collaboration
CrowdStrike values a collaborative culture, so be prepared to discuss how you've worked effectively within a team. Share experiences where you mentored others or learned from peers, showcasing your ability to contribute positively to a diverse team environment.