CrowdStrike GmbH logo

Sr. Security Researcher, TAC Cloud (Remote)

CrowdStrike GmbH
13 hours ago
Full-time
On-site
DEU Remote Germany
Remote Cybersecurity

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:
CrowdStrike Intelligence is seeking a motivated cloud security specialist with excellent technical skills to research the activities of cloud-conscious adversaries. Our Technical Analysis Cell (TAC) is at the forefront of CrowdStrike’s mission against cloud-conscious threat actors. We often are the first to catch adversaries leverage never-before observed techniques in the cloud. We combine intelligence analysis with deep-dive cloud service provider log analysis (AWS CloudTrail, Azure Activity Logs), and reverse engineering of malicious code, in addition to building and using automation systems to deliver actionable indicators and operational insights. CrowdStrike is uniquely positioned to leverage data from a multitude of sources, including incident response, managed threat hunting, proprietary telemetry, our large internal malware corpus, and our custom-built analysis pipeline. We foster a diverse environment of respectful, passionate camaraderie and collaboration between researchers who enjoy the fast-paced nature of our work.This highly technical position serves an important role in conducting research, increasing our coverage of the global cloud threat landscape, contributing to the continuous tracking of cloud adversaries, and ultimately developing finished intelligence products that provide a decision advantage to customers. These skills will be used to successfully carry out the following duties:


What You'll Do:
Technical Analysis:

  • Reconstruct, investigate, and track cloud intrusions leveraging cloud service provider activity logs (AWS CloudTrail, Azure Activity Logs) and document findings.

  • Enhance understanding of observed cloud activity by reproducing the activity in a test cloud environment.

  • Create tools to automate analysis tasks and tracking of threat actors.

  • Write cloud-activity-based (KQL, Amazon Athena), host-based (Yara) and network-based (Snort/Suricata) signatures suited for large-scale hunting, detection, and tracking of threats.

  • Perform a technical analysis and reverse engineering of tools related to threat activity within the cloud environment or as part of cloud-conscious intrusions

  • Intelligence Reporting:

  • Produce high-quality, actionable intelligence reporting.

  • Collaborate with our interdisciplinary team to coordinate adversary and campaign tracking, and to provide support to teams developing mitigation strategies and responding to incidents.


What You'll Need:
Required:

  • Understanding of cloud security concepts in particular identity and access management (IAM).

  • Ability to reconstruct incidents based on cloud activity logs from at least one major cloud service provider (AWS, Azure, or GCP)

  • Ability to express complex technical and non-technical concepts in written, verbal and graphical products for all levels of readership, including actionable mitigation and detection guidance.

  • Knowledge of programming and scripting languages, in particular Python.

  • Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc).

  • Ability to identify and classify malicious tooling through development of signatures that can be used for tracking and hunting purposes.

  • Ability to interpret raw network data and to develop network signatures, as well as custom protocol decoders and decryption tools.

  • Be a team player

Bonus Points:

  • Experience developing detections with KQL and Amazon Athena

  • Proven track record of relevant experience in the cloud security field

  • A background in intelligence is a plus.

  • Relevant cloud certifications are a plus.

#LI-EV1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.