Profession | Sr. Security Researcher - Cloud Security |
Profession | Sr. Security Researcher - Cloud Security |
We at CrowdStrike are looking for a highly technical colleague that helps me study threats to the cloud! We are a remote first company, have a great data set, and need additional headcount. You would work with me directly in the Technical Analysis Cell. Together we would be the first to analyze cloud activity logs to discover and document new techniques such as persistence via identity federation (https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a).
https://crowdstrike.wd5.myworkdayjobs.com/en-US/crowdstrikecareers/job/USA---Remote/Sr-Security-Researcher---Cloud-Intelligence-Mission--Remote-_R15460
If you have any questions, feel free to reach out to me via direct message. Note that I’m not the hiring manager.
We had to specify a region for our hiring portal which is why it states USA-/Canada-Remote. While this would be ideal to increase our window of coverage, we will consider candidates from all regions where we can hire. I myself am based in Europe.
#cloudsecurity #cloud #threatintel #hiring #aws #azure #gcp #FediHire #fedihired #remotework #remote
Are you not interested in analyzing/documenting cloud-conscious threat actor activities but would rather help catch them via cloud honeypots and search/reproduce vulnerabilities at cloud service providers? Then this position for a colleague in the ART team might be something for you: https://crowdstrike.wd5.myworkdayjobs.com/en-US/crowdstrikecareers/job/United-Kingdom---Remote/Sr-Security-Researcher--Cloud--Remote-_R15540
We at CrowdStrike are looking for a colleague that helps me study threats to the cloud! We are a remote first company, have a great data set, and I need some help to handle this influx of cloud cases. You would work as my direct counterpart in the Global Threat Analysis Cell which is focused on finding trends and clusters activities to adversaries with the intent of producing threat intelligence. The next SPIDER/…/PANDA/BEAR could carry a name that you chose:
If you have any questions, feel free to reach out to me via direct message.
I know the job description states USA-Remote but I’m sure we are more flexible on the location as I am based in Europe.
#cloudsecurity #cloud #threatintel #hiring #aws #azure #gcp #FediHire #fedihired #remotework #remote
#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight. About the Role: CrowdStrike Intelligence, a core component of CrowdStrike, is seeking a motivated Intelligence Analyst with excellent analysis skills for the Global Threat Analysis Cell (GTAC) to identify, research and track trends associated with the cloud threat landscape. This role will be focused on tracking and documenting cloud-related techniques that are observed in the wild and their use by both targeted intrusion and eCrime adversaries in close collaboration with other subject matter experts on the Intelligence team. This position serves an important role in increasing our understanding of trends in the global cloud threat landscape, contributing to the continuous tracking of criminal and state-sponsored adversary groups, and ultimately developing finished intelligence products. The ideal candidate for this position is a specialist in AWS/Azure/GCP log analysis with the ability to track the adversary landscape based on intrusion behavior. We are also open to applications by experienced and talented Analysts without significant knowledge in this field that are willing to rapidly expand their skills to meet the following requirements: What You'll Do: Identify threats, trends, and new developments in the cloud threat landscape by analyzing raw intelligence and data. This may involve querying ElasticSearch or analyzing raw cloud logs like CloudTrail Identify and monitor the Tactics, Techniques, and Procedures (TTPs) employed by cyber threat actors that compromise cloud environments Apply understood analytic tradecraft to gathered intelligence in a consistent manner Provide and assist with finished intelligence analysis to internal and external customers through written reporting of varied depth on short deadlines, with minimal supervision Collaborate across teams to inform various functions within CrowdStrike Intelligence about activity of interest and to coordinate adversary/campaign tracking Identify intelligence gaps and submit requests for information to fill gaps Conduct briefings as needed for a variety of levels of customers as requested (via either phone, video conference, webcast, in-person briefing, or industry conference) What You'll Need: Minimum of 2-3 years’ experience in a threat intelligence environment Motivated self-starter with experience in the cyber threat intelligence field, preferably with experience in researching and reporting on cloud incidents in AWS, Azure, and GCP as well as adversary behavior Experience analyzing API logs (e.g. CloudTrail) from at least one of the three major cloud service providers: AWS, Azure, or GCP Basic understanding of identity and access management (IAM) concepts in the cloud Ability to identify and track adversary tradecraft trends Ability to produce quality finished intelligence products on short deadlines, as well as continuing to maintain analysis for and report on long term strategic assessments Basic knowledge of how malware is developed, functions, and is employed Desire to extend knowledge on intelligence tradecraft and technical terminology relevant to cloud intelligence, as well as provide assistance to other members of the intelligence team Undergraduate degree, military training or relevant experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc. Other technical security certifications or academic background are a plus. #LI-AO1 Benefits of Working at CrowdStrike: Remote-first culture Market leader in compensation and equity awards Competitive vacation and flexible working arrangements Comprehensive and inclusive health benefits Physical and mental wellness programs Paid parental leave, including adoption A variety of professional development and mentorship opportunities Offices with stocked kitchens when you need to fuel innovation and collaboration We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve. CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact Recruiting@crowdstrike.com, for further assistance. CrowdStrike, Inc. is committed to fair and equitable compensation practices. The salary range for this position in the U.S. is $80,000 - $115,000 per year + bonus + equity + benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location. CrowdStrike participates in the E-Verify program. Notice of E-Verify Participation Right to Work CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
#introduction Hey all doing an introduction here, so you know who you follow here.
I'm Sebastian, a Security Researcher for a Security Vendor. This means I track attacks that happen to companies and take note of the techniques so I can report about them to our customers. The best is, if I can group several attacks together knowing they are the same actor and see the adversary's tradecraft develop over time.
I have a background in malware analysis/reverse engineering and since this summer I'm working full time on threats to cloud security.
In the past, I had the honor of naming the SolarMarker malware after colleagues at work came across a sample and passed it over to me for analysis/reversing.
I'm posting very low volume, so the signal/noise ratio here should be pretty good.
I'm looking forward to interesting discussions and findings you all share here on this platform (especially about cloud security).