About the Role:
The CrowdStrike EndPoint Protection (EPP) Content product group is seeking a highly motivated individual with strong technical acumen to join our Threat Efficacy team. In this role, you will be responsible for monitoring and analyzing the extensive array of detections and preventions deployed by various internal teams within CrowdStrike. The primary objectives of this team include responding to customer inquiries regarding threat detections and capabilities, proactively managing false positives, and enhancing the overall efficacy of our content.
This position will involve close collaboration with internal teams such as Technical Account Managers, Support engineers, Falcon Complete, Data Science, and content engineering teams within the organization.
Security Response is committed to addressing our customers' security needs as threats evolve and ensuring CrowdStrike maintains coverage of all relevant threats, regardless of the source of attack. Falcon Sensor is a unique endpoint detection and response solution, and Security Analysts on the Security Response Team will have the opportunity to translate their analysis findings into impactful detection capabilities.
What You'll Do:
Provide assistance to various internal teams in the creation of new detections, improvements to existing models, and assessment of detection gaps related to various CrowdStrike products.
Document and offer expert-level information to diverse stakeholders regarding content detections within CrowdStrike Falcon.
Support customers and teams in enhancing or suppressing detection alerts.
Develop new detection content based on adversarial or testing activity observed in logs.
What You'll Need:
Comprehensive understanding of common adversary tactics and techniques.
Demonstrated ability to analyze complex situations and articulate information clearly to diverse stakeholders.
Profound understanding of and ability to interpret logs generated by systems, networks, and applications.
Proven experience in identifying and isolating unique patterns within process behavior or logs (e.g., RegEx, correlation rules, YARA).
Prior experience with EDR products and endpoint security monitoring.
Expertise in and understanding of Windows, Linux, and MacOSX operating systems.
Capacity to contribute both independently and collaboratively within a team environment.
Possess an inquisitive nature and the ability to conduct thorough research using historical data.
Exhibit a keen eye for documenting pertinent details and facilitating focused discussions.
Eagerness to acquire new knowledge and skills.
Bonus Points:
Experience in a security operations center or similar environment responding to incidents.
Demonstrated ability to automate repetitive tasks to enhance overall work efficiency.
In-depth experience with and knowledge of penetration testing (red team) methodologies and tools.
Forensic experience is highly desirable.
Proficiency in utilizing Jira for the management and maintenance of development queues.
Working knowledge of various programming/scripting languages, dynamic malware analysis and sandboxing, and/or penetration testing tools and techniques.
Good understanding of the application development life cycle (SDLC).
Education:
BA/BS or MA/MS degree or equivalent experience in Computer Science, Information Security, or a related field