Product Security Engineer III (Remote, GBR)
Role details
Job location
Tech stack
Job description
Join CrowdStrike's Product Abuse team as an Engineer III, where you'll be at the forefront of defending our Falcon platform against sophisticated threat actors. In this dynamic role, you'll lead threat hunting operations, drive collaborative response efforts, and architect security enhancements to protect our global customer base. Operating at both strategic and tactical levels, you'll work within a close-knit team to identify, analyze, and neutralize emerging abuse vectors before they impact our platform. What You'll Do:
- Lead threat hunting operations against emergent threat activity to determine impact and resolution
- Conduct collaborative response efforts with cross-functional teams
- Drive and promote product security enhancements in the platform
- Develop proactive prevention & detection capabilities for evolving TTPs
- Instrument purpose-built event driven tooling to drive hunting efficiency
- Advocate for preemptive real-time response processes, CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions-including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs-on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Requirements
Do you have experience in SIEM?, * Motivated self-starter with 5+ years experience in a cybersecurity or threat intelligence environment, with a focus on threat hunting and tooling
- Comprehensive, practical knowledge of intrusion analysis
- Familiarity with threat hunting in large SIEM environments (e.g., LogScale)
- Experience in incident response, preferably in a role focusing on SaaS platforms and data-rich environments
- Familiarity with computer networking fundamentals, computer network operations (CNO), host-based forensics, and network traffic monitoring
- Capability in scripting language (e.g., Python/Perl/Ruby) to automate processes and extend your toolkit
- Understanding of technical terminology, tactics, techniques, and procedures employed by threat actors
- Knowledge of the evolving threat landscape to support an understanding of current and future impacts
- Passionate about taking the initiative to identify and develop enrichments and enhanced visibility
- Enthusiasm for collaboration, including working in a team-oriented environment and across functional teams to leverage subject matter expertise