Sebastian Walla

@SebastianWalla@infosec.exchange
74 Followers
142 Following
14 Posts
ProfessionSr. Security Researcher - Cloud Security
@SebastianWalla, Steffen Haas, @tillmannwerner, and myself will present a .NET instrumentation framework tomorrow at @recon 2025 in Montreal. Here's a humble brag sneak peek demo-ing how easy it is to write a function tracer!

We at CrowdStrike are looking for a highly technical colleague that helps me study threats to the cloud! We are a remote first company, have a great data set, and need additional headcount. You would work with me directly in the Technical Analysis Cell. Together we would be the first to analyze cloud activity logs to discover and document new techniques such as persistence via identity federation (https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a).
https://crowdstrike.wd5.myworkdayjobs.com/en-US/crowdstrikecareers/job/USA---Remote/Sr-Security-Researcher---Cloud-Intelligence-Mission--Remote-_R15460
If you have any questions, feel free to reach out to me via direct message. Note that I’m not the hiring manager.
We had to specify a region for our hiring portal which is why it states USA-/Canada-Remote. While this would be ideal to increase our window of coverage, we will consider candidates from all regions where we can hire. I myself am based in Europe.
#cloudsecurity #cloud #threatintel #hiring #aws #azure #gcp #FediHire #fedihired #remotework #remote

Are you not interested in analyzing/documenting cloud-conscious threat actor activities but would rather help catch them via cloud honeypots and search/reproduce vulnerabilities at cloud service providers? Then this position for a colleague in the ART team might be something for you: https://crowdstrike.wd5.myworkdayjobs.com/en-US/crowdstrikecareers/job/United-Kingdom---Remote/Sr-Security-Researcher--Cloud--Remote-_R15540

@iplaynice In the past we also had quite a few non-senior positions (although in other mission areas), so perhaps you can be on the lookout for those if you don't feel you have relevant enough experience yet. At this moment I'm not aware of any open non-senior position in our department.
@iplaynice since it is a senior position we would like someone with prior experience, although not necessarily in the exact position. E.g a background in cloud security (e.g. cloud IR, or cloud architect) or as an intelligence analyst might be a useful.
In general all our positions require a resume, as it gives us a first chance to gain an impression of candidates. It is great if someone worked in the exact required field, but a resume enables us to also look for transferable skills a candidate could use that they might not even be aware of.

Hey @iplaynice ,

I would encourage you to still apply to the role if you think you are meeting some of the criteria. A job description is basically like a wishlist of what an ideal candidate would look like. We have previously converted senior positions to junior positions, if the junior candidate was strong enough.

We at CrowdStrike are looking for a colleague that helps me study threats to the cloud! We are a remote first company, have a great data set, and I need some help to handle this influx of cloud cases. You would work as my direct counterpart in the Global Threat Analysis Cell which is focused on finding trends and clusters activities to adversaries with the intent of producing threat intelligence. The next SPIDER/…/PANDA/BEAR could carry a name that you chose:

https://crowdstrike.wd5.myworkdayjobs.com/en-US/crowdstrikecareers/job/Sr-Intelligence-Analyst---Cloud-Intelligence-Mission--Remote-_R13446

If you have any questions, feel free to reach out to me via direct message.

I know the job description states USA-Remote but I’m sure we are more flexible on the location as I am based in Europe.
#cloudsecurity #cloud #threatintel #hiring #aws #azure #gcp #FediHire #fedihired #remotework #remote

Sr. Intelligence Analyst - Cloud Intelligence Mission (Remote)

#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight. About the Role: CrowdStrike Intelligence, a core component of CrowdStrike, is seeking a motivated Intelligence Analyst with excellent analysis skills for the Global Threat Analysis Cell (GTAC) to identify, research and track trends associated with the cloud threat landscape. This role will be focused on tracking and documenting cloud-related techniques that are observed in the wild and their use by both targeted intrusion and eCrime adversaries in close collaboration with other subject matter experts on the Intelligence team. This position serves an important role in increasing our understanding of trends in the global cloud threat landscape, contributing to the continuous tracking of criminal and state-sponsored adversary groups, and ultimately developing finished intelligence products. The ideal candidate for this position is a specialist in AWS/Azure/GCP log analysis with the ability to track the adversary landscape based on intrusion behavior. We are also open to applications by experienced and talented Analysts without significant knowledge in this field that are willing to rapidly expand their skills to meet the following requirements: What You'll Do: Identify threats, trends, and new developments in the cloud threat landscape by analyzing raw intelligence and data. This may involve querying ElasticSearch or analyzing raw cloud logs like CloudTrail Identify and monitor the Tactics, Techniques, and Procedures (TTPs) employed by cyber threat actors that compromise cloud environments Apply understood analytic tradecraft to gathered intelligence in a consistent manner Provide and assist with finished intelligence analysis to internal and external customers through written reporting of varied depth on short deadlines, with minimal supervision Collaborate across teams to inform various functions within CrowdStrike Intelligence about activity of interest and to coordinate adversary/campaign tracking Identify intelligence gaps and submit requests for information to fill gaps Conduct briefings as needed for a variety of levels of customers as requested (via either phone, video conference, webcast, in-person briefing, or industry conference) What You'll Need: Minimum of 2-3 years’ experience in a threat intelligence environment Motivated self-starter with experience in the cyber threat intelligence field, preferably with experience in researching and reporting on cloud incidents in AWS, Azure, and GCP as well as adversary behavior Experience analyzing API logs (e.g. CloudTrail) from at least one of the three major cloud service providers: AWS, Azure, or GCP Basic understanding of identity and access management (IAM) concepts in the cloud Ability to identify and track adversary tradecraft trends Ability to produce quality finished intelligence products on short deadlines, as well as continuing to maintain analysis for and report on long term strategic assessments Basic knowledge of how malware is developed, functions, and is employed Desire to extend knowledge on intelligence tradecraft and technical terminology relevant to cloud intelligence, as well as provide assistance to other members of the intelligence team Undergraduate degree, military training or relevant experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc. Other technical security certifications or academic background are a plus. #LI-AO1 Benefits of Working at CrowdStrike: Remote-first culture Market leader in compensation and equity awards Competitive vacation and flexible working arrangements Comprehensive and inclusive health benefits Physical and mental wellness programs Paid parental leave, including adoption A variety of professional development and mentorship opportunities Offices with stocked kitchens when you need to fuel innovation and collaboration We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve. CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact Recruiting@crowdstrike.com, for further assistance. CrowdStrike, Inc. is committed to fair and equitable compensation practices. The salary range for this position in the U.S. is $80,000 - $115,000 per year + bonus + equity + benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location. CrowdStrike participates in the E-Verify program. Notice of E-Verify Participation Right to Work CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.

@malware_traffic @sans_isc since I changed roles internally and I'm now looking at cloud threats I no longer have the visibility from customer submissions, but I remember seeing several malware families that used AutoIT besides South America focused malware :)
@sans_isc @malware_traffic IIRC since 2021 (at least that is the earliest what I have data from) I always observed campaigns using AutoIT in the beginning of the year, which then quiet down over the months.
@GossiTheDog that game was really fun, but my friends somewhat ruined it for me after telling me that you can't sprint diagonally. I never realized that before, but after knowing that I couldn't walk properly anymore.
@DrAzureAD thank you. I added them to my reading stack 😀​