Posted:
7/2/2024, 5:00:00 PM
Location(s):
Massachusetts, United States
Experience Level(s):
Senior
Field(s):
IT & Security
Workplace Type:
Hybrid
#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.
About the Role:
Come join the CrowdStrike Platform Operations team and join our mission to protect our most critical customers. The Resident Responder Consultant is responsible for providing dedicated support to customers with implementation, ongoing operational support, threat hunting, and incident response functions using the CrowdStrike platform and related technologies. The Resident Responder Consultant will act as an oversight and technical escalation point for customer security operations center (SOC) team using CrowdStrike and related technologies as well as having responsibility for planning, optimizing, maintaining, and follow on support for the CrowdStrike platform and associated applications.
Specific Opportunity Information:
• Onsite
• Secret Clearance
• Background and drug testing are required
What You’ll Do:
Advise customer of Cloud Security best practices, Cloud Security Configuration, and integration to meet business requirements
Design, implement, and configure SIEM solutions to collect, correlate, and analyze security events and logs from various sources.
Gather and support log sources into Elastic, creating custom detections to help expand holistic security posture visibility
Help customers build and mature their security operations and threat detection and response capabilities
Develop and maintain correlation rules, filters, and dashboards to improve the accuracy and efficiency of threat detection
Align cloud configurations and log sourcing for best practices
Guide customers by researching and assessing customer threats and indicators of compromise
Create reporting dashboards based on cloud platform security events
Act as escalation point cloud platform inquiries and issues
Review current cloud and SIEM environments to address any performance and security objectives, gaps, and/or opportunities
Optimizes, configures, and tests cloud and SIEM technology deployment to assist with custom detection and dashboard creation as well as log ingestion
Work closely and collaboratively onsite with customer security and information technology teams
Leverage APIs, builds scripts, and develop processes to support SIEM configuration
Act as the technical and/or senior level interface for customer concerns or escalations
Maintain awareness of customer environment for upcoming technologies and features releases to assist customer with adoption and operationalizing into their security operations process
What You’ll Need:
Bachelor’s degree, in Computer Science, Information Technology, Cybersecurity or a related field, and/or equivalent military or work experience.
Active Secret Clearance
5+ years of experience with SIEM administration, configuration, and management
3+ years of client-facing consulting experience
Highly knowledgeable on Windows, Mac, and Linux platforms as well as cloud environments such as AWS, GCP, and Azure
Working knowledge of Microsoft Office applications, Word, Excel, Access, PowerPoint, etc.
Strong communication and collaboration skills
Proven ability to convey technical concepts to audiences with varying technical expertise, from analyst to executive levels
Broad experience in computer and network systems security
Solid analytical/problem solving skills with capability to identify solutions to unusual and complex problems
High level of motivation; self-starter; results driven
Bonus Points:
Scripting experience: PowerShell, Python, Bash
Federal Government workspace experience
Relevant certifications such as CISSP, GIAC, or vendor-specific SIEM certifications
#LI-DL1
#LI-Onsite
Benefits of Working at CrowdStrike:
Remote-first culture
Market leader in compensation and equity awards
Competitive vacation and flexible working arrangements
Comprehensive and inclusive health benefits
Physical and mental wellness programs
Paid parental leave, including adoption
A variety of professional development and mentorship opportunities
Offices with stocked kitchens when you need to fuel innovation and collaboration
We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact [email protected], for further assistance.
CrowdStrike participates in the E-Verify program.
CrowdStrike, Inc. is committed to fair and equitable compensation practices. The base salary range for this position in the U.S. is $95,000 - $155,000 per year + variable/incentive compensation + equity + benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location.Website: https://www.crowdstrike.com/
Headquarter Location: Sunnyvale, California, United States
Employee Count: 5001-10000
Year Founded: 2011
IPO Status: Public
Last Funding Type: Post-IPO Equity
Industries: Artificial Intelligence (AI) ⋅ Cloud Data Services ⋅ Cloud Security ⋅ Cyber Security ⋅ Network Security