CrowdStrike Logo

CrowdStrike

Threat Analyst, Machine Learning (Remote, East/Central)

Posted 3 Days Ago
Remote
38 Locations
Entry level
Remote
38 Locations
Entry level
As a Threat Analyst at CrowdStrike, you will analyze malware and customer detection tickets, improve detection capabilities, and assist internal teams with inquiries about threats. Your work will involve reverse engineering, managing false positives, and examining binary files to enhance security measures.
The summary above was generated by AI

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

For you to join the mission.  At CrowdStrike we’re on a mission - to stop breaches. Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner. We’ve earned numerous honors and top rankings for our technology, organization and people – clearly confirming our industry leadership and our special culture driving it. 

The opportunity: Our CrowdStrike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer- and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who has experience involving detections and/or reverse engineering. The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with detections of potentially malicious behavior by machine learning models is a plus.

Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.

This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science. 

What You'll Do:

  • Review current product detections to ensure they are performing to the company standard

  • Perform tasks to enable better-management of false positive detections

  • Analyze binary files to determine their legitimacy

  • Address internal questions and concerns regarding customer threat detections

What You'll Need:

  • Exposure and understanding of different types and functionality of malware

  • Experience with reverse engineering malware, or malware operations

  • Knowledge of programming and scripting languages, in particular Python

  • Fundamental understanding of attributes of binary files such as imports/exports and packers

  • Ability to demonstrate practical knowledge of research/collection skills and analytical methods

  • General understanding of threat/risk management and threat/risk assessment

  • Familiarity with various operating systems

  • Ability to break down complex problems into workable components

Bonus Points:

  • Experience in a security operations center or similar environment responding to incidents

  • A thorough understanding of Windows OS internals and the Windows API

  • Knowledge of MacOS and/or Linux

  • Familiarity with tools used in targeted and criminal cyber-intrusions

  • A background in exploit and vulnerability analysis

  • Knowledge of a variety of programming languages including C, C++, Java, and assembly

  • Experience with threat detections by machine learning

Education:

  • BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field

#LI-Remote
#LI-RC1

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs 

  • Competitive vacation and holidays for recharge  

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Find out more about your rights as an applicant.

CrowdStrike participates in the E-Verify program.

Notice of E-Verify Participation

Right to Work

CrowdStrike, Inc. is committed to fair and equitable compensation practices. The base salary range for this position in the U.S. is $100,000 - $150,000 per year + variable/incentive compensation + equity + benefits. A candidate's salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location.

Top Skills

Assembly
C
C++
Java
Python

Similar Jobs at CrowdStrike

Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves managing a regional team providing NG-SIEM and LogScale implementation services. Responsibilities include team building, providing hands-on customer support, managing projects, and ensuring successful delivery outcomes. The manager will also work cross-functionally and contribute to developing customer documentation and workshops.
Top Skills: BashPython
2 Days Ago
Remote
USA
Entry level
Entry level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a SOC Analyst, you'll operate within CrowdStrike's virtual security operations center to detect, respond to, and remediate incidents across various platforms. You will handle incidents related to advanced threats while producing communications for customer management and participating in thought leadership.
Top Skills: .NetCC#PerlPythonRuby On RailsVb
3 Days Ago
Remote
USA
Internship
Internship
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The IT Collaboration Support Intern will assist in implementing, managing, and supporting collaboration solutions, drive small to medium projects, and partake in documentation. They will also engage in communication with senior leadership and collaborate with various internal teams to ensure compliance.
Top Skills: BashPowershellPython

What you need to know about the Toronto Tech Scene

Although home to some of the biggest names in tech, including Google, Microsoft and Amazon, Toronto has established itself as one of the largest startup ecosystems in the world. And with over 2,000 startups — more than 30 percent of the country's total startups — Toronto continues to attract new businesses. Be it helping entrepreneurs manage their finances, simplifying business operations by automating payroll or assisting pharmaceutical companies in launching new drugs, the city's tech scene is just getting started.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account