Threat Analyst II, Machine Learning Operations and Response - Weekends (Remote, AUS)

Posted 13 Days Ago
Be an Early Applicant
6 Locations
Remote
Entry level
Cloud • Information Technology • Sales • Security • Cybersecurity
Define your future at CrowdStrike.
The Role
The Threat Analyst II will analyze malware and provide insights into threat detections. Responsibilities include reviewing product detections, managing false positives, analyzing binary files, responding to internal inquiries, and evaluating Machine Learning predictions. The role is suitable for individuals starting their careers in threat detection and response.
Summary Generated by Built In

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

Our CrowdStrike Data Science Machine Learning Operations and Response Team is looking for a Threat Analyst who is both customer and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who is just starting or considering a career involving detections and reverse engineering. The primary responsibility of this role will be to analyze malware and detections by investigating individual customer detection tickets. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with detections of potentially malicious behavior by machine learning models is a plus.

Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection capability. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections.

This role will work most closely with internal teams such as Technical Account Managers, Falcon Complete, Data Scientists and the Malware Research Center in Data Science.

Due to the nature of the role, the successful candidate will be required to work on Saturdays and Sundays. However, there is some flexibility around a 4- or 5-day work week including the start and end days for the work week, which is open to discussion.

What You’ll Do:

  • Review current product detections to ensure they are performing to the company standard

  • Perform tasks to enable better-management of false positive detections

  • Analyze binary files to determine their legitimacy

  • Address internal questions and concerns regarding customer threat detections

  • Review Machine Learning predictions

What You’ll Need:

  • Exposure and understanding of different types and functionality of malware

  • General knowledge of reverse engineering malware, or malware operations

  • Fundamental understanding of attributes of binary files such as imports/exports and packers

  • Ability to demonstrate practical knowledge of research/collection skills and analytical methods

  • General understanding of threat/risk management and threat/risk assessment

  • Familiarity with various operating systems

  • Knowledge of one scripting language, Python, Bash or PowerShell

  • Ability to break down complex problems into workable components

  • Experience with threat detections by Machine Learning

  • BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field

Bonus Points:

  • Experience in a security operations center or similar environment responding to incidents

  • Good understanding of Windows OS internals and the Windows API

  • Knowledge of MacOS and/or Linux OS

  • Familiarity with tools used in targeted and criminal cyber-intrusions

  • A background in exploit and vulnerability analysis

  • Knowledge of programming C, C++, Java, assembly or GoLang

  • If you have experience in using a post-exploitation framework (for example Metasploit)

  • Splunk, SIEM or Elastic knowledge

  • MITRE ATT&CK Framework knowledge

#LI-JC1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Top Skills

Python

What the Team is Saying

Andrew C.
Lauren P.
Brian P.
Alexa Z.
Theo K.
Sara I.
Lam N.
Lauren B.
Adeeb C.
Kristan C.
Alena C.
Thaddeus M.
Alyssa J.
KT T.
The Company
HQ: Austin, TX
10,000 Employees
Hybrid Workplace
Year Founded: 2011

What We Do

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks.

The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team.

We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?

Why Work With Us

We have a culture that celebrates achievement, encourages flexibility and innovation and thrives on teamwork. We all work towards a single mission: to stop breaches. This common goal drives a sense of community and connection among our people across the globe.

Gallery

Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery

CrowdStrike Offices

Hybrid Workspace

Employees engage in a combination of remote and on-site work.

Typical time on-site: Flexible
HQAustin, TX
Singapore
Osaka
Aarhus, DK
Arlington, VA
Barcelona, ES
Bengaluru, IN
Brussels, BE
Bucharest, RO
Cheltenham, GB
Copenhagen, DK
Dubai, Dubai
Irvine, CA
Kirkland, WA
Minneapolis, MN
Mumbai, IN
New Delhi, IN
Pune, IN
Reading, GB
Riyadh, SA
St Louis, MO
Sydney, Sydney
Tel Aviv-Yafo, IL
Tokyo, Japan
Learn more

Similar Jobs

CrowdStrike Logo CrowdStrike

Sr. Intelligence Analyst (Remote, AUS)

Cloud • Information Technology • Sales • Security • Cybersecurity
Remote
6 Locations
10000 Employees

CrowdStrike Logo CrowdStrike

Incident Response Consultant - Cloud (Remote)

Cloud • Information Technology • Sales • Security • Cybersecurity
Remote
9 Locations
10000 Employees

CrowdStrike Logo CrowdStrike

Analysts, and Senior Analysts, Falcon Complete (Remote, AUS)

Cloud • Information Technology • Sales • Security • Cybersecurity
Remote
5 Locations
10000 Employees

CrowdStrike Logo CrowdStrike

Sr.Training Instructor - Next-Gen SIEM (Remote, AUS)

Cloud • Information Technology • Sales • Security • Cybersecurity
Remote
8 Locations
10000 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account