Cyber Analyst, Digital Forensics Incident Response
At-BayFull Time
Mid-level (3 to 4 years)
Key technologies and capabilities for this role
Common questions about this position
Yes, the position is remote as indicated by the job title.
Candidates should be proficient in the deployment and management of security tools, have an Incident Response or Information Security background, and be capable of incident handling across Windows, Mac, and Linux platforms, including basic to advanced malware analysis.
CrowdStrike cultivates a culture that gives every employee flexibility and autonomy to own their careers, with a focus on limitless passion, relentless innovation, and commitment to customers, community, and each other. They emphasize working with like-minded, smart people for daily learning and mentoring.
Strong candidates embrace challenges with complex organizations and security detections, have experience leading teams and interacting with customers, and seek opportunities to refine skills while developing others in an Incident Response or Information Security background.
This information is not specified in the job description.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.