Engineer III - Threat Detection (Hybrid, New York)

CrowdStrikeNew York, NY
2dHybrid

About The Position

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. We work on large scale distributed systems, processing almost 3 trillion events per day and this traffic is growing daily. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: The CrowdStrike Next-Generation Security Information and Event Management (NG SIEM) Detection Content team is seeking an experienced and passionate professional to analyze threat actor tactics ranging from prevalent to the most obscure, and to drive efforts to mitigate them by implementing robust coverage. The team is focused on improving detection & response capability and efficacy for the Falcon NG SIEM platform through tactical analysis of ongoing attacks by criminal and nation state actors impacting our customer base. If you have demonstrable proficiency in using traditional SIEM systems, Security Orchestration, Automation and Response (SOAR) tools and real-world experience dealing with advanced threat actors (nation-state, criminal, hacktivist or other), we have a role for you!

Requirements

  • You have a passion for stopping criminals and making this a safer cyber world
  • You are capable and comfortable communicating information to both technical and executive-level stakeholders
  • You have a deep understanding of security workflows and can build automation and response logic that aligns with customer operations.
  • You have a deep understanding of the threat landscape and are experienced in applying that knowledge to identify trends to anticipate shifts in tactic, technique and procedures (TTPs) to implement emulations and engineer detection solutions
  • You are comfortable assessing cyber threat intelligence, open source intelligence or partner reporting
  • You have working knowledge of programming and scripting languages, in particular Python or Go
  • You have experience emulating threat actor TTPs to drive detection content development
  • You have experience in a security operations center or similar environment tracking threat actors and responding to incidents
  • You have experience building SOAR playbooks that automate triage, enrichment, containment and escalation actions.
  • You have experience analyzing telemetry and customer feedback to improve detection efficacy and response outcomes
  • You are looking for a dynamic, fast-paced and challenging role in an unconventional team environment
  • You have experience with one or more SIEM/SOAR products (Splunk, PAN XSOAR, Google SecOps, Elastic Stack, etc.)
  • Bachelor’s degree in information security, computer science or more than 5 years of equivalent work experience
  • Demonstrated ability to convey technical concepts to audiences with varying technical prowess
  • Willingness to teach and mentor others on the team

Nice To Haves

  • Contributions to the open source community (GitHub, Stack Overflow, blogging)
  • Published research papers at conferences or through other mediums (blogs, articles)

Responsibilities

  • The role requires independent work as well as the ability to work in a team environment.
  • In this role, you will be expected to be a Subject Matter Expert (SME), to analyze large data sets and to be able to emulate threat actor tactics to write effective and efficient threat detection rules along with an “automation-first” mindset to build SOAR playbooks that can help operationalize response at scale.
  • You will be expected to mentor other team members, and to actively participate in knowledge transfers both internal and external to the team.
  • In addition, this role will require you to take initiative to identify and solve important issues facing our customers.
  • Ultimately, you will work alongside the leaders within the team to set the technical direction and influence decision making that would have a direct impact on the product.
  • The role will be in a cutting-edge threat detection engineering team regularly facing off against sophisticated malicious techniques and cyber criminals.

Benefits

  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service