Match score not available

Sr. Security Researcher (Remote, GBR)

extra holidays - extra parental leave - work from home
Remote: 
Full Remote
Contract: 
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Bachelor’s degree in Computer Science or equivalent, Proficiency in Python or Go, malware analysis.

Key responsabilities:

  • Gather requirements, develop and maintain malware analysis pipeline
  • Collaborate with analyst teams to enhance threat coverage
CrowdStrike logo
CrowdStrike Cybersecurity Large https://www.crowdstrike.com/
5001 - 10000 Employees
See more CrowdStrike offers

Job description

​​#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.

About the Role:

The CrowdStrike Intelligence team is looking for a motivated researcher with experience in the information security domain and software development skills to work on our dedicated Intelligence Automation team, building processing pipelines, information storage systems, and presentation layers in support of malware analysis pipelines, including static and dynamic sandboxing environments.

The collection, processing, and exploration of malware samples and other information at a large scale is at the core of the Intelligence mission at CrowdStrike. The Intelligence Automation team is responsible for prototyping, building, and operating the systems that make up our Intelligence pipeline, and we'd like you to join us!

This position is at the intersection of threat analysis and software development. It serves an important role in increasing our visibility into the global threat landscape, and contributes to the continuous tracking of more than a hundred adversary groups.

You will mainly use Go and Python to maintain and improve our world-class malware processing pipeline technology as well as downstream data integration and processing systems in a fast-paced Intelligence environment. In this environment, requirements sometimes shift rapidly, and projects can live anything from weeks to years depending on changes in the surrounding ecosystem. You will be responsible for all aspects of the software you design, from documentation to deployment to production, and will interact regularly with your internal customers to gather requirements, solicit feedback, and validate your results. When encountering problems or bugs you will use your debugging skills, including binary reverse-engineering, to determine the root cause and mitigate the issue.

As a remote employee on a team distributed across various time zones, you will not have direct access to all of your co-workers for the entire workday, so the ability to work unsupervised, communicate asynchronously, and take the initiative in maintaining lines of communication is important. In addition, we are looking for someone who would like to be part of a team who are passionate about their work and go the extra mile to exceed expectations. We love enthusiastic individuals who bring a positive attitude to their work and really care about what they produce for our internal customers.

What You'll Do:

  • Integrate into the Intelligence team and gather requirements from Intelligence Analysts and Technical Analysts as internal customers

  • Develop and maintain a large-scale malware analysis pipeline

  • Develop detection content for the analysis pipeline to extend coverage of new threats in collaboration with various analyst teams

  • Autonomously make choices about implementation details, as well as the right

    balance between rapid development, scalability, and performance

  • Continuously improve an extensive existing Go/Python codebase

What You'll Need:

  • Bachelor’s degree in Computer Science or equivalent academic/work experience

  • Proficiency in at least one of these languages: Python, Go

  • Experience developing production-grade software

  • Knowledge of docker and container orchestration

  • Knowledge of malware sandboxing/analysis technologies and sandbox evasion techniques

  • Ability to communicate technical detail in a simple, top-down manner to both, management and customers

  • Ability to independently make sound, justifiable decisions and take action

  • Ability to plan, organize and prioritize work independently and meet deadlines

  • Ability to work on a geographically distributed and diverse team

Bonus Points:

  • Familiarity with the AWS cloud ecosystem (e.g. EC2, S3, VPC, ECS)

  • Knowledge of Windows OS internals and virtualization with QEMU

  • Experience in binary reverse engineering

  • Experience creating scalable and well-documented HTTP APIs

  • Offensive information security experience, e.g. from capture-the-flag (CTF) competitions

  • Experience with Ansible and large-scale VM management

#LI-EV1

#LI-JP2

#L1-Remote

Benefits of Working at CrowdStrike:

  • Remote-first culture

  • Market leader in compensation and equity awards with option to participate in ESPP in eligible countries

  • Competitive vacation and flexible working arrangements

  • Physical and mental wellness programs 

  • Paid parental leave, including adoption 

  • A variety of professional development and mentorship opportunities

  • Access to CrowdStrike University, LinkedIn Learning and Jhanna

  • Offices with stocked kitchens when you need to fuel innovation and collaboration

  • Birthday time-off in your local country

  • Work with people who are passionate in our mission and Great Place to Work certified across the globe

We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact Recruiting@crowdstrike.com, for further assistance.

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Cybersecurity
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Prioritization
  • Verbal Communication Skills

Security Analyst Related jobs