As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About this Role:
As a Lead Threat Hunter you will be a key member of our Security Operations team, driving the detection, investigation, and response to advanced cyber threats. In this role, you will design and refine detection patterns across various technologies, participate in active threat hunting, and guide the organization's security posture with your insights and expertise. Your ability to operate across a wide array of data sources, maintain rigorous confidentiality, and provide hands-on incident response will be critical to safeguarding CrowdStrike's assets and reputation.
What You’ll Do:
Leadership & Program Management:
Lead and define organizational threat hunting strategy
Guide and mentor junior threat hunters
Provide technical leadership and expertise to the Incident Response team
Design and implement structured hunting frameworks
Prioritize hunting operations based on threat intelligence and risk
Measure and report on program effectiveness
Champion agile project management fundamentals for hunting initiatives
Threat Detection & Analysis:
Develop detection patterns across different technologies and log sources
Triage detections to identify and remediate threats, including containment and live response
Execute structured threat hunting missions using hypothesis-driven approaches
Create and implement custom hunting queries and detection logic
Leverage structured analytic techniques and MITRE ATT&CK framework to track adversarial behavior
Incident Response & Escalation:
Participate in incident response activities, providing technical expertise
Offer on-demand after-hours support for critical security incidents
Collaborate with cross-functional teams on threat mitigation
Transform hunt findings into actionable incident response procedures
Develop threat hunting use cases based on incident response findings
Security Data Management & Reporting:
Identify coverage gaps and optimize security data and tooling
Prepare and present hunting metrics to technical and executive stakeholders
Utilize OSINT and closed intelligence sources for threat analysis
Maintain comprehensive hunt documentation and knowledge base
Develop and maintain hunting dashboards for program visibility
Tooling & Integration:
Engineer and tune security detections for SOAR, SIEM, and TIP
Develop and maintain custom hunting tools and scripts
Integrate hunting capabilities into existing security stack
Automate routine hunting tasks and data collection
Cross-functional Collaboration:
Partner with key stakeholders (Networking, Infrastructure, DevOps)
Coordinate threat management approaches across security teams
Present findings and recommendations to various audience levels
Drive continuous improvement through knowledge sharing and innovation
What You'll Need:
Education & Experience:
Bachelor's degree (or equivalent experience) in a computer-related field
8+ years of progressive experience in Information Security, Threat Hunting, or related roles
US Citizenship required due to direct work on GovCloud
Technical Expertise:
Proven understanding of the MITRE ATT&CK framework, Diamond Model, and Cyber Kill
Chain
Experience analyzing raw data from security controls (web proxy, firewalls, IPS, IDS, antivirus)
Proficiency with SIEM, SOAR, TIP integrations, and link analysis tools
Strong IT background (networking fundamentals, systems) and expertise with OSX, Linux, and Windows
Significant experience with system/application log analysis and security data correlation
Analytical & Communication Skills:
Effective communication skills in English (verbal and written)
Excellent investigative, analytical, and problem-solving abilities
Ability to maintain strict confidentiality and operate independently in high-pressure situations
Preferred Skills & Attributes:
Scripting knowledge (e.g., Python, Perl, Bash, PowerShell)
Familiarity with Splunk or other advanced SIEM platforms
Experience with host and network forensics
Background in malware analysis
Familiarity with agile project management and compliance frameworks
Technical security certifications or advanced academic credentials
#LI-RC1
#LI-KM1
#LI-Remote
Benefits of Working at CrowdStrike:
Remote-friendly and flexible work culture
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Great Place to Work Certified™ across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Zealogics Inc
TALTERE
Google Fiber
National Audubon Society
Abbott