Security Analyst, Incident Response
SpyCloudFull Time
Mid-level (3 to 4 years)
Candidates must have experience in incident handling, computer forensic analysis, systems administration, network forensic analysis, malware analysis, incident remediation, network operations and architecture/engineering, and programming/scripting in languages such as C, C#, VB, Python, Perl, Ruby on Rails, or .NET. Bonus points are awarded for the ability to complete technical tasks independently, a desire for professional growth, strong project management skills, thought leadership in incident response, and the ability to foster a positive work environment. A willingness to work a 4x10 schedule is also required.
The Sr. Security Analyst will exercise incident handling processes across Windows, Mac, and Linux platforms, perform malware analysis, and develop/improve processes for incident detection and countermeasure execution. They will also produce high-quality written and verbal communications, recommendations, and findings to customer management, and demonstrate industry thought leadership through blog posts, CrowdCasts, and public speaking events.
Cloud-native endpoint security solutions provider
CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity field, known for its effectiveness in threat detection and response.