Cybersecurity Threat Analyst
Maxar TechnologiesFull Time
Mid-level (3 to 4 years), Senior (5 to 8 years)
Candidates should have experience in incident handling, computer forensic analysis, systems administration, network forensic analysis, malware analysis, incident remediation, network operations and architecture/engineering, or programming/scripting in languages such as C, C#, VB, Python, Perl, Ruby on Rails, and .NET. All candidates must be capable of completing technical tasks without supervision, possess a desire to grow technical and soft skills, and have strong project management skills.
Analysts will exercise incident handling processes across Windows, Mac, and Linux platforms, perform basic malware analysis, and develop and improve processes for incident detection and countermeasure execution. They will produce high-quality written and verbal communications, recommendations, and findings to customer management, and demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.