What are the responsibilities and job description for the Threat Analyst, Machine Learning (Remote, Eastern & Central) position at CrowdStrike?
#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.
About The Role
Our CrowdStrike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer- and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who has experience involving detections and/or reverse engineering. The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with detections of potentially malicious behavior by machine learning models is a plus.
Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.
This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science.
What You'll Do
What You'll Need:
Benefits Of Working At CrowdStrike
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
CrowdStrike, Inc. is committed to fair and equitable compensation practices. The base salary range for this position in the U.S. is $100,000 - $150,000 per year variable/incentive compensation equity benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location.
About The Role
Our CrowdStrike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer- and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who has experience involving detections and/or reverse engineering. The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with detections of potentially malicious behavior by machine learning models is a plus.
Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.
This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science.
What You'll Do
- Review current product detections to ensure they are performing to the company standard
- Perform tasks to enable better-management of false positive detections
- Analyze binary files to determine their legitimacy
- Address internal questions and concerns regarding customer threat detections
What You'll Need:
- Exposure and understanding of different types and functionality of malware
- Experience with reverse engineering malware, or malware operations
- Knowledge of programming and scripting languages, in particular Python
- Fundamental understanding of attributes of binary files such as imports/exports and packers
- Ability to demonstrate practical knowledge of research/collection skills and analytical methods
- General understanding of threat/risk management and threat/risk assessment
- Familiarity with various operating systems
- Ability to break down complex problems into workable components
- Experience in a security operations center or similar environment responding to incidents
- A thorough understanding of Windows OS internals and the Windows API
- Knowledge of MacOS and/or Linux
- Familiarity with tools used in targeted and criminal cyber-intrusions
- A background in exploit and vulnerability analysis
- Knowledge of a variety of programming languages including C, C , Java, and assembly
- Experience with threat detections by machine learning
- BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field
Benefits Of Working At CrowdStrike
- Remote-first culture
- Market leader in compensation and equity awards
- Competitive vacation and flexible working arrangements
- Comprehensive and inclusive health benefits
- Physical and mental wellness programs
- Paid parental leave, including adoption
- A variety of professional development and mentorship opportunities
- Offices with stocked kitchens when you need to fuel innovation and collaboration
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
CrowdStrike, Inc. is committed to fair and equitable compensation practices. The base salary range for this position in the U.S. is $100,000 - $150,000 per year variable/incentive compensation equity benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location.
Salary : $100,000 - $150,000
Machine Learning Operations Engineer, Baseball Systems
Detroit Tigers -
Detroit, MI
Parole/Probation Officer 9 - P11
Departmental Analyst 12 (CAV Analyst) - Metro... -
Wayne, MI
Machine operator
Berkley Screw Machine Products, Inc -
Rochester, MI