Sr. Engineer II (Remote) at CrowdStrike
About the Role:
The CrowdStrike Malware Research Center is the core of Falcon’s malware detection and response capabilities. The team has a focus on understanding the threat landscape and sets the target for what Falcon should be identifying and preventing. Additionally, the MRC is responsible for understanding our capabilities, and mapping how well our machine learning and behavioral protection capabilities are doing against those threats. Where there is a gap, the MRC takes action to improve our detection stance, and improve our overall protection story. There are many parts of CrowdStrike working towards protecting customer environments, and the MRC works across all of them to ensure we are on target and providing the best protection for our current Threat landscape.
Remote U.S. role within a reasonable commuting distance to one of the following offices: Sunnyvale, CA; Irvine, CA; El Segundo, CA; Boston, MA; Austin, TX; Seattle, WA; Kirkland, WA; St. Louis, MO; Arlington, VA; Minneapolis, MN.
With a challenging role comes the requirement for a skilled professional who can lead efforts to at CrowdStrike for best of breed capability. As a Senior Engineer, you will
Work with a team of threat researchers, data scientists, and engineers to create technology and proof of concepts for detection and prevention of current and future threats in enterprise, cloud, mobile IoT and other domains.
Work with key decision makers across the organization to develop detection strategy and success metrics for current and future products and technologies.
Review and advice on release of key capability in field including new machine learning models and behavioral detections
Mentor researchers and data scientists to help them gain new skills and be successful
Exercise wide latitude in determining objectives and approaches and success criteria for critical assignments
Effectively communicate within all levels of CrowdStrike
10 years industry experience and a Master’s degree in a related field
Solid interpersonal and communication skills to communicate, along with a strong sense of empathy to help mentor team members
A proven background in using machine learning and artificial intelligence for static and dynamic threat detection
Skilled in reverse engineering around file-less threats, exploits, and other attack techniques
An excellent knowledge of malware and threat based automation workflows and techniques is required.
Familiarity with multiple operating systems (Windows, Linux, Mac, etc)
Familiarity with security use cases around public cloud (AWS, Azure, GCP, etc)
Strong understanding of file formats for compiled code and scripted files
Strong understanding of machine learning pipelines on premise and in public cloud and how to support machine learning models in the field
Strong interpersonal communications skills required, with the ability to demonstrate leadership and team building expertise required.