Threat Hunter - Security Operations Expert
Red Cell PartnersFull Time
Senior (5 to 8 years)
Candidates should possess effective collaboration and teamwork skills, proficiency in reverse engineering tools and processes, and a strong understanding of Windows OS internals. A solid grasp of programming and scripting languages, especially Python, is essential, as is the ability to identify and classify malicious tooling through signature development for tracking and hunting. Excellent communication skills for conveying complex technical concepts are required, along with a proven track record in cybersecurity. Preferred qualifications include the ability to interpret raw network data, develop network signatures, and create custom protocol decoders and decryption tools, as well as familiarity with tracking botnets, commodity malware, and adversaries involved in eCrime.
The role involves discovering, investigating, and tracking advanced cyber intrusions, documenting findings, and enhancing the understanding of tools and malware through reverse engineering. Responsibilities include developing automation tools for analysis tasks and threat actor tracking, creating host-based and network-based signatures for large-scale hunting and detection, and producing high-quality, actionable intelligence reports. The position also requires collaboration with an interdisciplinary team to coordinate adversary and campaign tracking and to support the development of mitigation strategies and incident response efforts.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.