×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Analyst , Falcon Complete; Remote

Remote / Online - Candidates ideally in
Sunnyvale, Santa Clara County, California, 94087, USA
Listing for: CrowdStrike, Inc.
Full Time, Remote/Work from Home position
Listed on 2025-12-08
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below
Position: Analyst I, Falcon Complete (Remote)

Crowd Strike, Inc. Full time | R25841

As a global leader in cybersecurity, Crowd Strike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed — we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on Crowd Strike to keep their businesses running, their communities safe and their lives moving forward.

We're also a mission-driven company. We cultivate a culture that gives every Crowd Striker both the flexibility and autonomy to own their careers. We're always looking to add talented Crowd Strikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters?

The future of cybersecurity starts with you.

About the Role

Crowd Strike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our Crowd Strike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.

Am

I an Analyst, Endpoint Protection Team Candidate?
  • Do you find yourself interested in putting your hands‑on technical skills to the test in detecting, containing, and remediating incidents?
  • Are you self‑motivated and looking for an opportunity to rapidly accelerate your skills?
  • Do you crave new and innovative work that actually matters to your customer?
  • Do you have an Incident Response or Information Security background that you're not fully utilizing?
  • Are you capable of leading teams and interacting well with customers?
  • Do you love working around like‑minded, smart people who you can learn from and mentor on a daily basis?
What You’ll Do
  • Exercise incident handling processes across Windows, Mac, and Linux platforms.
  • Perform basic malware analysis.
  • Develop and improve processes for incident detection and the execution of countermeasures.
  • Produce high‑quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, Crowd Casts, and other public speaking events.
What You’ll Need

Successful candidates will have experience in one or more of the following areas:

  • Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
Additionally, all candidates must possess the following qualifications
  • Capable of completing technical tasks without supervision.
  • Desire to grow and expand both technical and soft skills.
  • Strong project management skills.
  • Contributing thought leader within the incident response industry.
  • Ability to foster a positive work environment and attitude.
Requirements
  • Must be willing to work 4x10 schedule, including a day on the weekend.
  • Must be willing to work on site (hybrid schedule).
  • This role is…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary