Enter Search Term Below

company, language, or framework

There are 21 that inlcude crowdstrike in this search.

Tell Me More ↓

You will be required to synthesize and formulate guidance from a variety of information levels and sources (technical business field external) and regularly present key takeaways to the field and to senior leadership Provide tailored deal support (competitive surgeries & guidance) and develop a deep rapport with the field You will work closely with the rest of the Competitive Intelligence team at CrowdStrike as well as other key stakeholders (including the office of the CTO field leadership sales ops product and marketing teams) functioning as a primary liaison for cloud security competition which includes development of competitive support material and competitive readiness plans. Minimum 5 years of experience in Amazon Web Services (AWS) and either Google Cloud Platform (GCP) or Microsoft Azure Minimum of 5 years relevant work experience (Ideal candidates will have experience in at least TWO of the following): sales engineer pre-sales competitive intelligence solution architect sales operations product management technical marketing professional services and technical support. AWS Certified Solutions Architect AWS Certified Security - Specialty Security certifications issued by GIAC CompTIA ISACA or (ISC) Direct experience with customers (as a customer or in a customer support or field role)... Click to read more.

Tell Me More ↓

Minimum of 5 years relevant work experience (Ideal candidates will have experience in at least TWO of the following): sales engineer pre-sales competitive intelligence solution architect sales operations product management technical marketing professional services research & development and technical support. Hands-on experience with products (either designing evaluating testing or in production) Direct experience with customers (as a customer or in a customer support or field role)... Click to read more.

Tell Me More ↓

As a Senior (or Principal) Consultant you will be responsible for delivering both reactive and proactive services engagements in the Asia Pacific and Japan region. As the Leading consultant for cloud Incident response engagements you will be responsible for assisting our clients in identifying responding to and containing attacker activity in their AWS Azure and or GCP environments as well as improving the team's incident response capabilities by contributing to and spearheading automation projects.Manage projects and deliver adversary simulation (purple team) exercises in Azure AWS and GCP.Following certifications preferred but not required GIAC Cloud Forensics Responder (GCFR) or similar... Click to read more.

Tell Me More ↓

Must be able to effectively communicate at all levels (executive leadership and technical support teams) within CrowdStrike.Security community participation (conference speaker tool development contributor ...) is highly preferredAdvanced experience with Security Assessment Toolsets (Metasploit NMAP Cobalt Strike Nessus Burp Suite etc.)Advanced experience with Networking components (routers switches load balancers wireless access points etc.)Occasional travel may be required ( This role may require the candidate to periodically undergo and pass alcohol and or drug test(s) during the course of employment.... Click to read more.

Tell Me More ↓

CrowdStrike Intelligence a core component of CrowdStrike is seeking a Senior Intelligence Analyst for its Global Threat Analysis Cell (GTAC) to focus on eCrime activity. This position will be primarily focused on analyzing threats and tracking of known adversaries as well as emerging threats. A Senior Analyst will be required to research and report on eCrime operations from both the strategic and tactical level. This position is instrumental in providing unique insight into finished Intelligence products used by CrowdStrike customers and stakeholders.Identify and monitor the Tactics Techniques and Procedures (TTPs) used by cyber threat actors by analyzing raw intelligence and dataConduct briefings as needed for a variety of levels of customers as requested (via either phone video conference webcast in-person briefing or industry conference)... Click to read more.

Tell Me More ↓

Knowledge of operating systems other than Windows (Linux Mac)Published research or findings at conferences or through other non-academic channels (blogs articles)... Click to read more.

Tell Me More ↓

Solid grounding in at least one cloud environment (AWS Azure GCP)... Click to read more.

Tell Me More ↓

The CrowdStrike OverWatch GovCloud team is seeking a motivated Threat Hunter Intrusion Analyst with technical skills to analyze threat actor activity identify intrusions create detections and track campaigns as part of our Threat Hunting team. The GovCloud team is focused on both proactive and active threat hunting operations across our customer base in effort to continuously identify and disrupt the adversary while consistently improving detection capability and efficiency for the Falcon Host platform. If you are proficient in either host-based network intrusion analysis digital forensics or cyber threat intelligence and you want to gain real-world experience in dealing with advanced threat actors (be they nation-state criminal hacktivist or other) we have a truly unique role for you! The role will be on a cutting-edge threat-hunting team regularly facing off against sophisticated threat actors. If this sounds like an exciting opportunity we would like to hear from you.This particular position will be 100% remote and will require the candidate to support the following shift: Saturday - Tuesday from 17:00 - 4:00 ET (+0100 - 0800 UTC).Familiarity with adversary techniques and attack lifecycles. (e.g: adversary progression through techniques found in the MITRE ATT&CK® matrix).Willingness and ability to periodically undergo and pass additional background and fingerprint check(s) consistent with government customer requirements.Deeper knowledge of operating systems other than Windows (Linux Mac).Published research papers at conferences or through other mediums (blogs articles).This role may require the candidate to periodically undergo and pass alcohol and or drug test(s) during the course of employment.This role will require the candidate to periodically undergo and pass additional background and fingerprint check(s) consistent with government customer requirements.... Click to read more.

Tell Me More ↓

Audit Logging and Monitoring Controls (SIEM UEBA MDR XDR).This role may require the candidate to periodically undergo and pass alcohol and or drug test(s) during the course of employment.... Click to read more.

Tell Me More ↓

Manage projects and deliver adversary simulation (purple team) exercises in Azure AWS and GCP.This role may require the candidate to periodically undergo and pass alcohol and or drug test(s) during the course of employment.... Click to read more.

Tell Me More ↓

As a Regional Alliances Manager (RAM) in Mexico you will be responsible for driving new business opportunities with and through a named partner list in the Mexican territory. Success in this position will require working with internal teams and leading our strategic Partners (like TSystems Scitum TotalCyberSec and Dell AWS among others) to deliver growth with CrowdStrike. A successful candidate will possess excellent energy to be capable of building a strong productive relationship with your partners focusing on growing our business opportunities and achievement of a marked increase in the number of partner-originated opportunities deal registrations. Candidates with current strong cybersecurity knowledge are encouraged to apply.... Click to read more.

Tell Me More ↓

Draft negotiate revise and review a wide variety of contracts (Federal SLED and commercial) including SaaS agreements partner agreements teaming agreements NDAs professional services agreements statements of work and subcontract agreements.Bachelor's degree or equivalent with 8-11 years experience with federal state and local government contracting (and in particular with commercial item acquisitions) with technology companies with software or software-as-a-service offerings as COTS products and professional services with strong attention to detail.Strong background with all types of public sector buying vehicles (GWACs IDIQs BPA BOA etc.).Proven ability to negotiate and manage from cradle to grave large complex product and services (specifically cloud-based software and professional services) agreements with federal state and local customers.Experience with regulations that bear on cyber data security (e.g. DFARS 7012 NIST 800-171 FedRAMP etc.).... Click to read more.

Tell Me More ↓

Knowledge of operating systems other than Windows (Linux Mac). Published research or findings at conferences or through other non-academic channels (blogs articles).This role may require the candidate to periodically undergo and pass alcohol and or drug test(s) during the course of employment.... Click to read more.

Tell Me More ↓

Audit Logging and Monitoring Controls (SIEM UEBA MDR XDR).... Click to read more.

Tell Me More ↓

Tell Me More ↓

Conduct cutting edge research in the areas of Linux security (low level and high level operating system research) and become an authoritative source of knowledge in the teamComprehensive knowledge of cloud platforms (AWS Azure GCP) and their security features.Technical knowledge of network operating systems (mainly Linux) and data platform security... Click to read more.

Tell Me More ↓

Experience or willing to support public relations and conducting media interviews (all mediums) on various security and current affair topics including crisis situations... Click to read more.

Tell Me More ↓

Bachelor's degree (technical degree preferred). Salesforce.com certification (Administrator Advanced Administrator Certified CPQ Specialist) preferred but not required.... Click to read more.

Tell Me More ↓

Bachelor's degree (technical degree preferred). Salesforce.com certification (Administrator Advanced Administrator Certified CPQ Specialist) preferred but not required.... Click to read more.

Tell Me More ↓

Tell Me More ↓

The Business Resilience Specialist supports CrowdStrike's global Business Resilience (BR) department responsible for crisis management and business continuity disaster recovery. CrowdStrike takes an all-hazards approach to ensuring business operations and products services can withstand disruptions incidents and crisis events. The BR department is one element of the overall Security business unit reporting to the Chief Security Officer.This role will be primarily responsible for supporting company disaster recovery (DR) planning in addition to general BR program activities including business continuity analysis planning and crisis response. Conduct business impact analysis (BIA) and threat hazard assessments Develop maintain and update business continuity plans (BCP) crisis plans and other response procedures Relevant certification in one or more business continuity disaster recovery or IT disciplines (e.g. CBCP MBCI DRCS ITIL CISSP) Experience with supporting crisis management events (public or private sector) Experience with data analytics tools (e.g. Tableau Snowflake) and Business Continuity software... Click to read more.

Top