At a Glance
- Tasks: Analyse malware and support incident response with your technical expertise.
- Company: Join CrowdStrike, a global leader in cybersecurity with a mission that matters.
- Benefits: Competitive pay, wellness programmes, and professional development opportunities await you.
- Other info: Dynamic team culture with opportunities for growth and collaboration.
- Why this job: Be at the forefront of cybersecurity, tackling real-world threats and making a difference.
- Qualifications: Experience in malware analysis and strong problem-solving skills are essential.
The predicted salary is between 36000 - 60000 £ per year.
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward.
The CrowdStrike Intelligence Team is seeking a motivated malware reverse engineer with excellent technical skills to analyze malware and perform technical research to support customer requests, incident response cases, and other internal CrowdStrike teams. This is a highly technical position on a team within the Technical Analysis Cell (TAC), at the forefront of CrowdStrike's battles with nation state adversaries and criminal actors. The team is tasked with investigating and reverse engineering newly discovered, malicious artifacts and documenting analysis results as an intelligence report.
We respond quickly when needed and perform equally well at conducting detailed analysis. Communication and collaboration with other teams of CrowdStrike is highly important to facilitate this. As a distributed international team, we are looking for an energetic self-starter with the ability to take ownership and be accountable for deliverables while at the same time supporting and helping to improve upon our analysis workflow.
What You’ll Do
- Provide timely identification and summarization of threats to customers.
- Respond to technical questions by other teams within CrowdStrike.
- Continually improve our malware-analysis workflow.
- Extract configuration data from malware using in-house tools and manual analysis.
- Track relations between new threats and existing actors using in-house tools.
- Contribute to active mitigation efforts and support incident response engagements with malware analysis capabilities and technical expertise.
- Document threat evolutions and intelligence gaps for the broader Intelligence Team.
What You’ll Need
- Team player: someone who is eager to help, teach, and learn from others.
- Malware analysis experience.
- Strong problem-solving skills.
- Ability to express complex technical and non-technical concepts.
- Ability to learn new analysis techniques quickly, especially when faced with less-common file types.
- Excellent writing skills.
- Knowledge of programming and scripting languages, in particular Python.
Bonus Points
- In-depth knowledge of Windows and UNIX-based platforms.
- Experience in binary instrumentation.
- Experience identifying and classifying malicious tooling through development of signatures that can be used for tracking and hunting purposes.
- A background in intelligence is a plus.
Education
BA/BS degree or equivalent experience in a related field.
Benefits of Working at CrowdStrike:
- Market leader in compensation and equity awards.
- Comprehensive physical and mental wellness programs.
- Competitive vacation and holidays for recharge.
- Paid parental and adoption leaves.
- Professional development opportunities for all employees regardless of level or role.
- Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
- Vibrant office culture with world class amenities.
- Great Place to Work Certified across the globe.
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed.
Security Researcher, Malware Triage (Remote) in Warwick employer: CrowdStrike
Contact Detail:
CrowdStrike Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Researcher, Malware Triage (Remote) in Warwick
✨Tip Number 1
Network like a pro! Reach out to current CrowdStrike employees on LinkedIn or other platforms. Ask them about their experiences and any tips they might have for the interview process. Personal connections can give you an edge!
✨Tip Number 2
Prepare for technical interviews by brushing up on your malware analysis skills. Practice explaining complex concepts in simple terms, as communication is key in this role. We want to see how you think and solve problems!
✨Tip Number 3
Show your passion for cybersecurity! During interviews, share your personal projects or any relevant research you've done. This demonstrates your commitment and enthusiasm for the field, which is something we value at CrowdStrike.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re serious about joining our mission-driven team!
We think you need these skills to ace Security Researcher, Malware Triage (Remote) in Warwick
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter for the Security Researcher role. Highlight your malware analysis experience and any relevant technical skills that match what we're looking for at CrowdStrike.
Show Off Your Writing Skills: Since excellent writing skills are a must, take the time to craft clear and concise documents. Whether it's your cover letter or your CV, make sure you express complex concepts in an easy-to-understand way.
Be Yourself: We want to see the real you! Don’t hesitate to showcase your passion for cybersecurity and your eagerness to learn. Let your personality shine through in your application.
Apply Through Our Website: For the best chance of success, make sure to submit your application through our official website. This way, we can easily track your application and get back to you quicker!
How to prepare for a job interview at CrowdStrike
✨Know Your Malware
Before the interview, brush up on your malware analysis skills. Familiarise yourself with common malware types and their behaviours. Being able to discuss specific examples of malware you've analysed will show your technical expertise and passion for the field.
✨Showcase Your Problem-Solving Skills
Prepare to discuss how you've tackled complex problems in the past. CrowdStrike values strong problem-solving abilities, so think of scenarios where you identified a threat or improved an analysis workflow. Use the STAR method (Situation, Task, Action, Result) to structure your answers.
✨Communicate Clearly
Since communication is key in this role, practice explaining technical concepts in simple terms. You might be asked to explain a complex analysis to someone without a technical background, so being clear and concise will demonstrate your ability to collaborate effectively.
✨Be Ready to Learn
CrowdStrike is looking for someone who can quickly learn new techniques. Be prepared to discuss how you approach learning new tools or methodologies. Share examples of how you've adapted to new challenges in your previous roles, especially when dealing with less-common file types.