Sr. Security Researcher
CrowdStrike
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About CrowdStrike
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About The Role
CrowdStrike Intelligence is seeking a motivated Sr. Security Researcher with experience in the information security domain and excellent software development skills. Our Applied Research Cell (ARC) is at the forefront of CrowdStrike’s battles with state-sponsored adversaries and criminal actors. We combine world-class intelligence analysis with deep-dive reverse engineering and malicious code analysis to support a pipeline of fully automated tools that allow the delivery of actionable indicators and cutting-edge operational insights at scale. Our systems process millions of malicious files every day to extract information that protects our customers and informs our analysts.
This highly technical position is at the intersection of threat analysis and software development. It serves an important role in increasing our visibility into the global threat landscape, and contributes to the continuous tracking of more than a hundred adversary groups. The role supports analysis workflows by finding creative and innovative solutions for both technical and non-technical problems, and automating these. Systems we built are used by our intelligence analysts, incident responders, and threat hunters. The ideal candidate for this interdisciplinary position has experience with large-scale malware analysis and the development of custom tools that aid respective tasks.
This role has a special focus on enhancing CrowdStrike’s internal data holdings and quality. This will entail both deep ontological topics in the context of cyber threat intelligence as well as data handling at a large scale both in terms of planning as well as implementation. Experience with graph-based databases is a plus.
What You'll Do
- Develop and maintain automated systems for large-scale malware processing, unpacking, and indicator extraction.
- Identify and solve problems and areas of improvement in analysis workflows, processes, and automated systems.
- Plan and execute development of frontend and backend systems in the context of cyber security, cyber threat intelligence, and large-scale malware processing while balancing pragmatic short-term solutions with long-term strategies and vision.
What You'll Need
- Proficiency in English both written and spoken.
- Strong communication and interpersonal skills. Ability to accurately express complex technical and non-technical ideas verbally and graphically.
- Knowledge of programming and scripting languages, in particular Python.
- Profound knowledge of software architecture and development.
- Creativity and strong analytical skills to investigate, assess, validate, and think outside the box.
- Excellent problem solving skills and ability to work independently as well as the ability to collaborate on technical projects involving complex concepts.
Bonus Points
- Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc).
- Low-level programming experience (for example, C).
- Development and deployment of dockerized applications.
- Experience in static and dynamic malicious code reverse engineering.
- Experience with multiple platforms (Linux, MacOS, mobile, etc.) is a plus.
- A background in intelligence is a plus.
Education
BA/BS degree in Computer Science or a related field, or equivalent experience.
Benefits Of Working At CrowdStrike
- Market leader in compensation and equity awards
- Comprehensive physical and mental wellness programs
- Competitive vacation and holidays for recharge
- Paid parental and adoption leaves
- Professional development opportunities for all employees regardless of level or role
- Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
- Vibrant office culture with world class amenities
- Great Place to Work Certified™ across the globe
Key skills/competency
- Malware Analysis
- Reverse Engineering
- Python Programming
- Cyber Threat Intelligence
- Software Development
- Data Handling
- Graph Databases
- Automation
- Problem Solving
- Security Research
How to Get Hired at CrowdStrike
- Research CrowdStrike's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor.
- Tailor your resume: Highlight cybersecurity, Python proficiency, and malware analysis experience for Sr. Security Researcher roles.
- Showcase your expertise: Provide concrete examples of security research, tool development, and problem-solving in interviews.
- Prepare for technical deep-dives: Expect detailed questions on reverse engineering, software architecture, and data processing challenges.
- Demonstrate passion: Express genuine commitment to stopping breaches and continuous innovation in the cybersecurity space.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background