Cybersecurity Threat Analyst
Maxar TechnologiesFull Time
Mid-level (3 to 4 years), Senior (5 to 8 years)
Candidates should have experience in incident handling, computer forensic analysis, systems administration, malware analysis, and incident remediation. Proficiency in programming/scripting languages such as Powershell, C, C#, VB, Python, Perl, Ruby on Rails, and .NET is required, along with at least one relevant security certification. Strong verbal and communication skills, problem-solving abilities, and experience with Mac OS, Windows, and Unix operating systems are essential. The ability to handle high-pressure situations productively and professionally is also necessary.
The Associate Analyst will monitor and analyze security alerts using the CrowdStrike platform, exercise incident handling processes across Windows, Mac, and Linux, and perform malware analysis and remote remediation. They will develop and improve incident detection and triage processes, produce high-quality communications for customers, and demonstrate industry thought leadership through various channels. Additionally, they will assist in the advancement of security processes and procedures.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.