Threat Analyst Ii - Perth, Australia - Crowdstrike Holdings, Inc.

    Default job background
    Full time
    Description

    Threat Analyst II (Remote, AUS) page is loadedThreat Analyst II (Remote, AUS)ApplylocationsAustralia - Remote, ACAustralia - Remote, WAAustralia - Remote, SAAustralia - Remote, QLAustralia - Remote, VCtime typeFull timeposted onPosted 5 Days Agojob requisition idR15500#We Are Crowd Strike and our mission is to stop breaches.

    As a global leader in cybersecurity, our team changed the game.
    Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks.

    We're looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity.

    Consistently recognized as a top workplace, Crowd Strike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level.

    Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.


    About The Role:


    Our Crowd Strike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer- and team-focused.

    This role will include both pro-active and response aspects.
    This role will be perfect for someone passionate a career involving detections and reverse engineering.
    The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets.

    This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customerbase.

    Experiencewith detections of potentially malicious behavior by machine learning models is a plus.

    Bring yourpassion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability.

    Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.

    This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science.


    What You'll Do:
    Review current product detections to ensure they are performing to the company standardPerform tasks to enable better-management of false positive detectionsAnalyze binary files to determine their legitimacyAddress internal questions and concerns regarding customer threat detectionsWhat You'll Need:
    Exposure and understanding of different types and functionality of malwareBasic knowledge of reverse engineering malware, or malware operationsFundamental understanding of attributes of binary files such as imports/exports and packersAbility to demonstrate practical knowledge of research/collection skills and analytical methodsGeneral understanding of threat/risk management and threat/risk assessmentKnowledge of programming and scripting languages, in particular PythonFamiliarity with various operating systemsAbility to break down complex problems into workable componentsBonus Points:
    Experience in a security operations center or similar environment responding to incidentsGood understanding of Windows OS internals and the Windows APIKnowledge of Mac OS and/or LinuxFamiliarity with tools used in targeted and criminal cyber-intrusionsA background in exploit and vulnerability analysisKnowledge of a variety of programming languages including C, C++, Java, and assemblyExperience with threat detections by machine learningEducation
    BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field#LI-Remote
    #LI-JC1

    Benefits of Working at Crowd Strike:

    Remote-first cultureMarket leader in compensation and equity awards with option to participate in ESPP in eligible countriesCompetitive vacation and flexible working arrangementsPhysical and mental wellness programsPaid parental leave, including adoptionA variety of professional development and mentorship opportunitiesAccess to Crowd Strike University, Linked In Learning and JhannaOffices with stocked kitchens when you need to fuel innovation and collaborationBirthday time-off in your local countryWork with people who are passionate in our mission and Great Place to Work certified across the globeWe are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed.

    Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action.

    By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

    Crowd Strike is committed to maintaining an environment of Equal Opportunity and Affirmative Action.
    If you need reasonable accommodation to access the information provided on this website, please , for further assistance.

    About UsCrowd Strike was founded in 2011 to fix a fundamental problem:

    The sophisticated attacks that were forcing the world's leading businesses into the headlines could not be solved with existing malware-based defenses.

    Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware.

    #J-18808-Ljbffr