Crowdstrike

Incident Response Analyst (Remote, ROU)

Romania

Not SpecifiedCompensation
Junior (1 to 2 years)Experience Level
Full TimeJob Type
UnknownVisa
CybersecurityIndustries

Position Overview

  • Location Type:
  • Job Type: Full time
  • Salary:

CrowdStrike is a global leader in cybersecurity, protecting people, processes, and technologies that drive modern organizations. Our mission since 2011 has been to stop breaches, and we have redefined modern security with the world's most advanced AI-native platform. We are a mission-driven company fostering a culture of flexibility and autonomy, seeking talented individuals with passion, innovation, and a commitment to our customers, community, and each other.

About the Role

CrowdStrike is seeking a motivated Incident Response Analyst to support the incident-response lifecycle as the first line of defense within the CSIRT. This role involves triaging detections, investigating alerts, and taking rapid action (live response, containment, escalation) to defend against adversaries. You will collaborate with seasoned Incident Responders to enhance our security team.

Are you interested in:

  • Applying hands-on technical skills to detect, contain, and remediate incidents?
  • Rapidly accelerating your skills in a self-motivated environment?
  • Diving into logs, endpoint telemetry, and more to assess event scope and severity?
  • Working with like-minded security professionals in a world-class team for learning and mentorship?
  • Fine-tuning detections that will block future attacks?
  • Collaborating with a diverse, high-performing team and communicating technical risk to stakeholders?

Responsibilities

  • Provide continuous coverage for SIEM/SOAR, EDR, network, cloud, and email-security consoles; validate alerts, enrich with context, suppress false positives, and act on confirmed threats.
  • Gather evidence from logs, host telemetry, and threat-intel feeds to determine scope, severity, and business impact.
  • Execute pre-approved playbook actions (host isolation, account disablement, phishing-email purge, firewall block, etc.) and confirm containment success.
  • Escalate high-severity or complex incidents to senior analysts/IR leadership with concise summaries and proposed mitigation steps, remaining engaged through resolution.
  • Consistently meet or exceed response-time targets for critical and high-urgency tickets.
  • Record investigative steps, evidence, and decisions in the ticketing system; deliver clear shift-handoff notes for 24x7 operations.
  • Identify noisy rules, false-positive trends, blind spots, or missing log sources; collaborate on custom detections and log-source onboarding to improve alert fidelity.
  • Participate in refining existing runbooks, drafting new ones, and championing automation opportunities to reduce analyst workload.

Requirements

  • 1–3 years of hands-on SOC experience performing alert triage, incident handling, and first-responder containment, with daily use of SIEM/SOAR, EDR, IDS/IPS, firewalls/proxies, email-security tools, and deep log analysis.
  • Practical knowledge of Windows, macOS, and Linux internals and logging (Event Logs, Sysmon, auditd, etc.).
  • Solid understanding of TCP/IP, OSI layers, and common protocols (HTTP/S, DNS, SMTP); ability to interpret packet captures and network logs.
  • Proficiency with search/query languages (LQL, SPL, KQL, SQL etc.) for alert enrichment and indicator investigation, mapping findings to MITRE ATT&CK techniques.
  • Demonstrated experience responding

Skills

Incident Response
Alert Investigation
Live Response
Containment
Remediation
Log Analysis
Endpoint Telemetry
Security Operations
Threat Detection
Security Tools

Crowdstrike

Cloud-native endpoint security solutions provider

About Crowdstrike

CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.

Austin, TexasHeadquarters
2011Year Founded
$468MTotal Funding
IPOCompany Stage
Enterprise Software, CybersecurityIndustries
5,001-10,000Employees

Benefits

Competitive Employee Stock Purchase Plan
Remote-friendly culture
Market leader in compensation and equity awards
Competitive vacation and flexible working arrangements
Comprehensive health benefits + 401k plan
Paid Parental Leave, including adoption
Wellness programs
Professional development and mentorship opportunities
Open offices have stocked kitchens, coffee, soda and treats

Risks

Increased competition from companies like Lumos could challenge CrowdStrike's market share.
Recovery from last year's outage may still affect customer trust and future sales.
Pressure to demonstrate ROI by 2025 could challenge CrowdStrike's financial transparency.

Differentiation

CrowdStrike's Falcon platform offers cloud-native endpoint security solutions, a key differentiator.
The company serves 44 of the Fortune 100, showcasing its strong market presence.
CrowdStrike's proactive threat hunting sets it apart in cybersecurity threat detection.

Upsides

Partnership with SonicWall opens new SMB market segment for CrowdStrike.
Recognition as a leader in ransomware prevention boosts CrowdStrike's market credibility.
Gamified learning initiatives help address cybersecurity skills gap, benefiting future talent pipeline.

Land your dream remote job 3x faster with AI