×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Threat Analyst, Machine Learning; Remote, East

Remote / Online - Candidates ideally in
Dover, Kent County, Delaware, 19904, USA
Listing for: CrowdStrike
Remote/Work from Home position
Listed on 2026-02-12
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Threat Analyst, Machine Learning (Remote, East/Central)

As a global leader in cybersecurity, Crowd Strike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on Crowd Strike to keep their businesses running, their communities safe and their lives moving forward.

We’re also a mission-driven company. We cultivate a culture that gives every Crowd Striker both the flexibility and autonomy to own their careers. We’re always looking to add talented Crowd Strikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters?

The future of cybersecurity starts with you.

About

The Role

At Crowd Strike we’re on a mission - to stop breaches. Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner. We’ve earned numerous honors and top rankings for our technology, organization and people – clearly confirming our industry leadership and our special culture driving it.

The opportunity:

Our Crowd Strike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer- and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who has experience involving detections and/or reverse engineering. The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets.

This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with detections of potentially malicious behavior by machine learning models is a plus. Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.

This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science.

What You’ll Do
  • Review current product detections to ensure they are performing to the company standard
  • Perform tasks to enable better-management of false positive detections
  • Analyze binary files to determine their legitimacy
  • Address internal questions and concerns regarding customer threat detections
What You’ll Need
  • Exposure and understanding of different types and functionality of malware
  • Experience with reverse engineering malware, or malware operations
  • Knowledge of programming and scripting languages, in particular Python
  • Fundamental understanding of attributes of binary files such as imports/exports and packers
  • Ability to demonstrate practical knowledge of research/collection skills and analytical methods
  • General understanding of threat/risk management and threat/risk assessment
  • Familiarity with various operating systems
  • Ability to break down complex problems into workable components
Bonus Points
  • Experience in a security operations center or similar environment responding to incidents
  • A thorough understanding of Windows OS internals and the Windows API
  • Knowledge of MacOS and/or Linux
  • Familiarity with tools used in targeted and criminal cyber-intrusions
  • A background in exploit and vulnerability analysis
  • Knowledge of a variety of programming languages including C, C++, Java, and assembly
  • Experience with threat detections by machine learning
Education

BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field

Benefits Of…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary