About the Role:
At CrowdStrike we’re on a mission - to stop breaches. Our groundbreaking technology, services
delivery, and intelligence-gathering together with our innovations in machine learning and
behavioural detection, allow our customers to not only defend themselves, but do so in a
future-proof manner. We’ve earned numerous honors and top rankings for our technology,
organization and people – clearly confirming our industry leadership and our special culture
driving it.
The opportunity: Our CrowdStrike Data Science Machine Learning Operations and Response
Team is looking for a Threat Analyst III who is both customer and team-focused. This role will
include both response and pro-active aspects. This role will be perfect for anyone who has
experience involving detections using machine learning. The primary responsibility of this role
will be to analyze breaches and killchains involving malware and detections. This team is
focused on improving detection capability and efficacy of malware detection using machine
learning.
Bring your passion for helping internal partners resolve questions about detections of
potentially malicious activity by machine learning and our detection platform. Our goal for the
team is to both help internal teams respond to customer-inquiries about threat detection and
to provide information about the effects of our detections into the Data Science organization -
including detection efficacy and managing false positive detections.
This role will work most closely with internal teams such as Falcon Complete, Falcon
Overwatch, Data Scientists and the Malware Research Center in Data Science.
What You'll Do:
Lead efforts to review and refine product detections to ensure they meet and exceed
company standards
Identify and drive improvements in false positive detection management through deep
technical analysis and process enhancements
Analyze files and event data across different platforms (Linux, public Clouds, Mac, and
Windows) to assess predictions by machine learning
Act as a senior escalation point for internal teams regarding complex customer threat
detections
Collaborate cross-functionally with threat research, engineering, and incident response
teams to drive detection efficacy
What You'll Need:
Technical expertise in Linux or Mac operating systems, including internals and threat
behaviors
Experience in public Cloud environments, preferably AWS or Azure
Strong background in reverse engineering malware, reverse engineering tool sets and
malware operations
Experience leveraging machine learning for threat detection use case
Solid proficiency in Python, with additional experience in other scripting/programming
languages a plus
In-depth understanding of binary analysis, including file attributes, imports/exports, and
common packing techniques
Advanced analytical skills, including practical experience with threat research and
structured analysis methodologies
Strong grasp of threat/risk assessment and threat management frameworks
Proven ability to break down complex security problems into actionable solutions
Ability to join off hours/late meetings for cross-region coordination
Bonus Points:
Experience in a Security Operations Center (SOC), threat hunting, or a high-tempo
incident response environment
Expert-level knowledge of MacOS and/or Linux, with experience in threat detection,
analysis, or EDR tooling on those platforms
Advanced knowledge of the control plane and data plane of public cloud providers
Advanced knowledge of Windows OS internals and API behavior
Familiarity with tools and techniques used in targeted and criminal cyber-intrusions
Background in exploit development or vulnerability research
Knowledge of programming languages such as C, C++, Java, and Assembly
Exposure to working on GenAI and security
Education:
BA/BS or MA/MS degree in Computer Science, Information Security, or related field