Posted in

Threat Analyst – Machine Learning

Threat Analyst – Machine Learning

CompanyCrowdstrike
LocationKansas, USA, Pennsylvania, USA, North Dakota, USA, Delaware, USA, Iowa, USA, Washington, DC, USA, Vermont, USA, Los Angeles, CA, USA, Texas, USA, Jackson Township, NJ, USA, Florida, USA, Waterbury, CT, USA, South Carolina, USA, South Dakota, USA, Georgia, USA, Concord, NH, USA, Mississippi, USA, Tennessee, USA, Virginia, USA, Arkansas, USA, Minnesota, USA, Nebraska, USA, Rhode Island, USA, Kentucky, USA, West Virginia, USA, New York, NY, USA, Maryland, USA, Wisconsin, USA, Maine, USA, Massachusetts, USA, North Carolina, USA, Oklahoma, USA, Missouri, USA, Ohio, USA, Michigan, USA, Illinois, USA, Alabama, USA
Salary$100000 – $150000
TypeFull-Time
Degrees
Experience LevelMid Level

Requirements

  • Exposure and understanding of different types and functionality of malware
  • Experience with reverse engineering malware, or malware operations
  • Knowledge of programming and scripting languages, in particular Python
  • Fundamental understanding of attributes of binary files such as imports/exports and packers
  • Ability to demonstrate practical knowledge of research/collection skills and analytical methods
  • General understanding of threat/risk management and threat/risk assessment
  • Familiarity with various operating systems
  • Ability to break down complex problems into workable components

Responsibilities

  • Review current product detections to ensure they are performing to the company standard
  • Perform tasks to enable better-management of false positive detections
  • Analyze binary files to determine their legitimacy
  • Address internal questions and concerns regarding customer threat detections

Preferred Qualifications

  • Experience in a security operations center or similar environment responding to incidents
  • A thorough understanding of Windows OS internals and the Windows API
  • Knowledge of MacOS and/or Linux
  • Familiarity with tools used in targeted and criminal cyber-intrusions
  • A background in exploit and vulnerability analysis
  • Knowledge of a variety of programming languages including C, C++, Java, and assembly
  • Experience with threat detections by machine learning