Sr. Security Researcher - Collections (Remote)

CrowdStrike
1d$85,000 - $120,000Remote

About The Position

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: CrowdStrike is looking for a self-starting, responsible, action-oriented, and highly motivated individual to join our Intelligence Team. This position will require the candidate to support and advise on customer requests for information (RFIs), perform operational support functions, and provide collection management support. The mission of a Security Researcher is to leverage operational tradecraft to develop and maintain unique sources of cyber threat intelligence information and enable threat analysis to answer customer information needs. It serves as an important support role to ongoing analysis of actors, adversaries, geopolitical developments, and transnational issues, and is instrumental in providing unique insight into finished Intelligence products used by CrowdStrike customers and stakeholders. The successful candidate will be an operational security (OPSEC)-savvy, detail-oriented problem solver, and have experience balancing concurrent projects and routinely completing tasks with set deadlines. Highly qualified candidates will have a strong background in the Intelligence cycle, responding to requests for information (RFIs), collection management fundamentals, and operational support tasks. They will understand threat intelligence, have strong open source (OSINT) research skills, and be comfortable with internal and cross-team collaboration.

Requirements

  • Required Experience responding to customer RFIs on tight deadlines.
  • Experience using project management tools such as JIRA, as well as experience using message traffic handling systems and databases.
  • Motivated self-starter experienced with a wide variety of underground environments, to include hidden services and forums.
  • Must have experience with the full Intelligence Cycle to include collection, dissemination, and evaluation of raw information.
  • Understanding of technical terminology, slang, tools, and tactics employed by threat actors.
  • Basic to advanced understanding of computer technology, virtual machines, Internet protocols, and services.
  • Comprehensive, practical knowledge of research/collection tradecraft and analytical methods.
  • Comfortable navigating the deep and dark web, leveraging onion search engines, using VPNs, understanding cryptocurrencies and utilizing communication platforms.

Nice To Haves

  • Foreign language skills, particularly reading and writing (ex. Russian, Farsi, multiple dialects of Chinese, Korean, Japanese, etc.)
  • Prior intelligence community, human intelligence (HUMINT/Collection Management), counter-intelligence (CI), or cyber threat intelligence background.
  • Undergraduate degree and/or military or intelligence community training and experience in cyber intelligence, general intelligence studies, security studies, political science, international relations, etc.
  • Other technical security certifications or relevant academic background.

Responsibilities

  • Monitoring and responding to internal and external RFIs and collection support tasks through established workflow processes.
  • Experience performing operation support tasks such as training, doctrine development, CI/security tasks, and collection capability management.
  • Triaging tickets and ensuring collection requirements are tasked to the appropriate elements and completed within established time frames.
  • Identifying where novel collection activities can support and address known intelligence gaps vis a vis finished intelligence production.
  • Employing secure virtual operational tradecraft methods and practices when conducting research.
  • Maintaining awareness of threat actor tactics, techniques, and procedures to appropriately assess quality and credibility of operators, toolsets, and other offered services.

Benefits

  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service