Posted in Other about 5 hours ago.
Actively contribute to a cloud assessment methodology - collaborate with leadership, research, and product teams to continuously improve and develop new analysis approaches.
Leverage scientific thinking, analytics, and threat intelligence to identify viable attack paths and contextualize risk in client cloud environments based on resource configurations and business context.
Develop tools, detections, and queries to work with large data sets at scale, including SIEM analytics, querying APIs, and automating repetitive tasks.
Manage client engagements, lead internal teams, and provide regular status updates to clients regarding project status and findings.
Analyze cloud security architecture and resource configurations to identify security weaknesses and misconfigurations that may expose cloud environments to threats.
Review identity plane configurations and advise clients about hardening authentication and authorization controls, including hybrid identity.
Conduct workshops with stakeholders to identify gaps in cloud security management practices and governance, including logging, workload security, DevSecOps, and network security.
Write queries and simple scripts to interact with APIs exposed by security tools and cloud control plane services.
Produce high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including customer management, regulators, and legal counsel.
Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
At least 6 years of hands-on experience in cloud engineering, DevOps, security, or cloud support roles.
A strong understanding of one or more of the following cloud platforms: Azure, M365, AWS, GCP, or OCI.
Familiarity with modern cloud workloads - DevOps, CICD pipelines, containers, and related security defenses and pitfalls.
Strong analytical skills, attention to details, and critical thinking skills
Excellent communication skills, including a strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations related to major cloud platforms.
Cloud Incident Response: knowledge in AWS, Azure, M365, or GCP incident response methodologies.
An understanding of Kubernetes management plane, deployment models within public cloud environments, and container security.
Capable of completing technical tasks without supervision.
Desire to grow and expand both technical and soft skills.
Strong project management skills.
Contributing thought leader within the cloud security/incident response industry.
Ability to foster a positive work environment and attitude.
#LI-AC1
#LI-Remote
CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
PI259735374
Thermo Fisher Scientific |
Meta |
Meta |