[Hiring] Analyst I, Falcon Complete - 3rd Shift @CrowdStrike

Remote, USA Full-time Posted 2026-05-04
Apply Now

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

CrowdStrike is looking for highly motivated, self-driven, technical analysts dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike virtual security operations center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.

    This is a 3rd Shift Role (11pm-10am).
  • Exercise incident handling processes across Windows, Mac, and Linux platforms.
  • Perform basic malware analysis.
  • Develop and improve processes for incident detection and the execution of countermeasures.
  • Produce high-quality written and verbal communications, recommendations, and findings to customer management.
  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
    Qualifications
  • Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
  • Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
  • Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
  • Programming/Scripting: experience coding in C, C#, VB, Python, Perl, Ruby on Rails, and .NET.
  • Capable of completing technical tasks without supervision.
  • Desire to grow and expand both technical and soft skills.
  • Strong project management skills.
  • Contributing thought leader within the incident response industry.
  • Ability to foster a positive work environment and attitude.
    Requirements
  • Must be willing to work 4x10 schedule, including a day on the weekend.
  • This role is only open to US citizens and Green Card holders.
  • This is a 3rd Shift role, 11pm-10am.
    Education
  • BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.
  • Applicants without a degree but with relevant work experience and/or training will be considered.
    Benefits
  • Market leader in compensation and equity awards.
  • Comprehensive physical and mental wellness programs.
  • Competitive vacation and holidays for recharge.
  • Paid parental and adoption leaves.
  • Professional development opportunities for all employees regardless of level or role.
  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
  • Vibrant office culture with world class amenities.
  • Great Place to Work Certified™ across the globe.

Apply Now

Apply Now

Similar Jobs