This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Find jobs in Texas today!

To post a job, login or create an account |  Post a Job

  Jobs in Texas  

Bringing the best, highest paying job offers near you

previous arrow
next arrow
Slider

CrowdStrike: Detection Engineer – Epp Content (Remote)

CrowdStrike

This is a Full-time position in Megargel, TX posted May 7, 2021.

At CrowdStrike we?re on a mission to stop breaches.

Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner.

We?ve earned numerous honors and top rankings for our technology, organization and people ?

clearly confirming our industry leadership and our special culture driving it.

We also offer flexible work arrangements to help our people manage their personal and professional lives in a way that works for them.

So if you?re ready to work on unrivaled technology where your desire to be part of a collaborative team is met with a laser-focused mission to stop breaches and protect people globally, let?s talk.About the TeamThe EPP Content team is a central part of CrowdStrike?s mission ?We Stop Breaches.” In Content, we researchattacker behavior to understand their tools and techniques, and build software to detect and prevent malicious activity.

Our goal is to automatically stop the bad guys where possible, and to provide useful visibility and guidance to security analysts when new previously unknown adversary activity occurs.

Our detection strategies are often performed directly on the endpoint, and frequently.This ability to leverage a variety of tools across the CrowdStrike stack allows us to accomplish our detection goals while balancing resource utilization and efficacy for our customers.

About the RoleAs a Detection Engineer within the EPP Content team you will be focused on the analysis and development of detections for attack techniques across all operating systems.

You?ll work collaboratively to implement these detections within the Falcon sensor which is a lightweight kernel-level module that observes system activity, recognizes malicious behavior, provides on-box prevention capability, and sends relevant security related telemetry to the Falcon cloud.

You?ll help develop creative and resourceful ways to identify gaps and detect threats while leveraging core OS telemetry such as file system, memory, process, and network.

You?ll collaborate with multiple teams within engineering, and will be expected to make significant contributions to the design and implementation of major development projects.

We’re looking for smart people who want to be challenged and take ownership of what they build.Responsibilities* Identify gaps in detection capabilities:* Understand and track attacker tactics, techniques, and procedures (TTPs) as described in ATT& CK* Familiarize with offensive security tools and techniques across platforms* Evaluate product detection capabilities by planning and executing attack emulation scenarios* Design and build detection logic:* Extend our existing codebase and test suites utilizing C++, Python, and other tools as appropriate.* Brainstorm, define, and build collaboratively across multiple teams.* Build elegant, robust, and reliable solutions for complex technical problems.* Collaborate as a team-member:* Obsess about learning, and champion the newest technologies & tricks with others, raising the technical IQ of the team.* Troubleshoot issues within the product when necessary, assisting customer support.* Deliver and accept feedback with grace and courtesy.What You?ll Need * 5+ years of experience with EITHER one of:* Defensive security operations, such as threat intelligence, malware analysis, threat hunting, or detection development; and an interest in threat emulation, or* Offensive security operations, such as red-teaming, threat emulation, or offensive capability development; and an interest in detection engineering* Team player ?

able to lead, mentor, communicate, collaborate, and work effectively in a globally distributed team.Bonus Points Awarded For* Prior experience with threat hunting and/or endpoint detection engineering concepts such as gap analysis, detection tuning, and detection testing (e.G.

ATT& CK Evaluations, Caldera,Atomic Red-Team)* Prior experience building or operating red-team/pen-test/C2 frameworks (e.G.

Metasploit, Cobalt Strike, PoshEmpire, CALDERA, Apfel, Empyre)* Low-level OS knowledge and experience with one of more of our supported sensor platforms including Windows, macOS, and Linux.* Prior development or testing experience with python.* Prior experience delivering software via agile processes.#LI-DG1#LI-RemoteBenefits of Working at CrowdStrike:* Market leader in compensationand equity awards* Competitive vacation policy* Comprehensive health benefits + 401k plan * Paid parental leave, including adoption* Flexible work environment* Wellness programs* Stocked fridges, coffee, soda, and lots of treatsWe are committed to building an inclusive culture of belonging that not only embraces the diversity of our people but also reflects the diversity of the communities in which we work and the customers we serve.

We know that the happiest and highest performing teams include people with diverse perspectives and ways of solving problems so we strive to attract and retain talent from all backgrounds and create workplaces where everyone feels empowered to bring their full, authentic selves to work.CrowdStrike is an Equal Opportunity employer.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law.CrowdStrike participates in the E-Verify program.

Notice of E-Verify ParticipationRight to Work

Please add your adsense or publicity code here (inc/structure/adsfooter.php)