The CrowdStrike Security Response Team is seeking a motivated professional with technical skills and to analyze malware detections. The Security Response Team is focused on Improving detection capability and efficiency through Host platform for the Falcon tactical analysis of Ongoing attacks by nation states and criminal Actors impacting our customer base.
Analysts Security Response respond individually investigated and track incidents and large scale campaigns of malicious activity across a vast customer base leveraging the Graph ™ Threat CrowdStrike. The analyst is Responsible for reviewing and tuning detections Within the platform to Provide high quality and high fidelity detections. In addition the analyst is Responsible for reviewing our output of Machine Learning algorithms to aid in continuous training Efforts to Provide maximum results.
Security Response is dedicated to responding to our customer's security Would Needs Threats evolve and ensuring coverage of all relevant maintains CrowdStrike Threats Regardless of the source of attack. Host Falcon is a unique endpoint detection and response solution and Security Analysts on the Security Response Team Will have the Opportunity to translate into impactful detection analysis Findings Their Capabilities year backed by unprecedented number of events at Their disposal for analytic Initiatives.
Review Not enough current product detections They are performing to the company standard.
Perform tasks to enable detection false positive reduction.
Analyze binary files to determine if They are legitimate or malicious.
QUESTIONS customer Address Concerns and as it relates to detections.
Exposure and understanding through personal or academics Explorations on different types and functionality of malware.
Understanding of the fundamental attributes of binary files Such as Imports / exports and packers.
Ability to proven practical knowledge of research / collection skills and analytical methods.
Knowledge of programming and scripting languages, in particular Python.
Experience in a similar environment or responding to security incidents Operations Center.
Good understanding of Windows OS internals and the Windows API.
Used in targeted familiarity with tools and criminal intrusions.
A background in vulnerability and exploit analysis is a plus.
Knowledge of a variety of programming languages Including C, C ++, Java, and assembly.
General understanding of threat / risk management and threat / risk assessment.
BA / BS or MA / MS degree or equivalent experience in Computer Science, Information Security, or a related field