Staff Threat Intelligence Analyst
HuntressFull Time
Senior (5 to 8 years)
Key technologies and capabilities for this role
Common questions about this position
Yes, the position is remote.
Required skills include threat hunting with understanding of Windows and Linux forensic artifacts, strong threat analysis skills like hypothesis-driven analysis and IOC searching, threat intelligence on targeted attacks, scripting in Python or similar, platform architecture knowledge of Windows/Linux, networking protocols, identity concepts like Active Directory, and strong communication skills.
This information is not specified in the job description.
CrowdStrike cultivates a culture that gives every CrowdStriker flexibility and autonomy to own their careers, with a focus on limitless passion, relentless innovation, and commitment to customers, community, and each other.
Highly motivated, self-driven consultants with experience in threat hunting, analysis, intelligence, scripting, platform architecture, networking, identity, and strong communication skills stand out.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.