Incident Response Principal Consultant (Remote) at Crowdstrike

California, United States

Crowdstrike Logo
Not SpecifiedCompensation
N/AExperience Level
N/AJob Type
Not SpecifiedVisa
N/AIndustries

Requirements

  • Experience in Incident Response or Information Security
  • Successful candidates will have experience in one or more of the following areas:
  • Team leadership experience in a matrixed consulting environment
  • Incident Response: experience conducting or managing incident response investigations for organizations
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations
  • Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs
  • Incident Remediation: strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations
  • Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies
  • Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidelines, and recommendations to key stakeholders
  • Self-motivated and looking for an opportunity to rapidly accelerate skills
  • Capable of leading teams and interacting with customers
  • Passionate about making a difference in global security by protecting organizations against the most advanced attackers in the world
  • Limitedly utilized Incident Response or Information Security background
  • Able to work independently and as part of a team
  • Proficient in using various forensic analysis tools in incident response investigations
  • Strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs
  • Strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations
  • Strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidelines, and recommendations to key stakeholders
  • Experience with AWS, Azure, GCP incident response methodologies

Responsibilities

  • Lead incident response engagements
  • Develop and use new methods to hunt for bad actors across large sets of data
  • Conduct intrusion investigations under the direction of outside counsel
  • Perform host and/or network-based forensics across Windows, Mac, and Linux platforms
  • Perform basic malware analysis
  • Produce high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events
  • Lead teams and interact with customers
  • Conduct network analysis and perform analysis of associated network logs
  • Perform reverse engineering of static and dynamic malware analysis
  • Develop and implement incident remediation plans for compromised organizations
  • Perform network operations and architecture/engineering

Skills

Crowdstrike

Cloud-native endpoint security solutions provider

About Crowdstrike

CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.

Austin, TexasHeadquarters
2011Year Founded
$468MTotal Funding
IPOCompany Stage
Enterprise Software, CybersecurityIndustries
5,001-10,000Employees

Benefits

Competitive Employee Stock Purchase Plan
Remote-friendly culture
Market leader in compensation and equity awards
Competitive vacation and flexible working arrangements
Comprehensive health benefits + 401k plan
Paid Parental Leave, including adoption
Wellness programs
Professional development and mentorship opportunities
Open offices have stocked kitchens, coffee, soda and treats

Risks

Increased competition from companies like Lumos could challenge CrowdStrike's market share.
Recovery from last year's outage may still affect customer trust and future sales.
Pressure to demonstrate ROI by 2025 could challenge CrowdStrike's financial transparency.

Differentiation

CrowdStrike's Falcon platform offers cloud-native endpoint security solutions, a key differentiator.
The company serves 44 of the Fortune 100, showcasing its strong market presence.
CrowdStrike's proactive threat hunting sets it apart in cybersecurity threat detection.

Upsides

Partnership with SonicWall opens new SMB market segment for CrowdStrike.
Recognition as a leader in ransomware prevention boosts CrowdStrike's market credibility.
Gamified learning initiatives help address cybersecurity skills gap, benefiting future talent pipeline.

Land your dream remote job 3x faster with AI