Incident Response Analyst (Remote)

Reposted Yesterday
Hiring Remotely in CA
Remote or Hybrid
85K-120K Annually
Mid level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Define your future at CrowdStrike.
The Role
The Incident Response Analyst will support the incident response lifecycle, manage security incidents, conduct investigations, collaborate with teams, and improve response processes.
Summary Generated by Built In

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

CrowdStrike is looking for a highly motivated, self-driven Incident Responder to support the incident-response lifecycle—serving as a core member of IR Operations, a team within CSIRT focused on threat detection and incident response.
In this role, you’ll support a high-impact team, and participate in complex initiatives, take ownership of security incidents, and conduct in-depth technical investigations to identify, investigate and and respond to security threats across the organization.

You’ll work shoulder-to-shoulder with seasoned incident response investigators to drive continuous process improvement across our world-class security team.

  • Do you find yourself interested in putting your hands-on technical skills to the test in investigating and resolving complex escalated investigations?

  • Are you self-motivated and looking for an opportunity to broaden your expertise through research, operational initiatives, and complex investigations?

  • Are you ready to dive into logs, endpoint telemetry, and threat intelligence to uncover the root cause of an incident?

  • Do you enjoy working around like-minded security professionals in a world class team who you can both learn from and mentor on a daily basis?

  • Are you looking for a role where your contributions to training, research, and process design directly strengthen incident response operations?

  • Do you enjoy collaborating with a high-performing team and explaining technical risk to stakeholders who depend on your insights?

What You’ll Do:

  • Take ownership of security incidents detected by CSIRT, identify and recommend improvements to enhance workflows, tools, and response effectiveness.

  • Participate in escalated incidents by gathering and analyzing evidence from logs, endpoint telemetry, and threat-intel sources; perform and adapt investigative or containment actions from playbooks—such as host isolation, phishing email removal —and confirm remediation.

  • Conduct in-depth research on incident response related topics that support team operations and improve investigative capabilities.

  • Maintain clear documentation of investigative steps, evidence, decisions, and project progress to support transparency and knowledge sharing.

  • Identify gaps in detection coverage, workflows, or tooling, and collaborate on new detection logic, playbook refinements, and automation opportunities.

  • Contribute to the creation and maintenance of runbooks, knowledge articles, and other deliverables that strengthen CSIRT’s incident response capabilities.

 What You’ll Need:

  • Demonstrated experience performing incident response from escalation through resolution, leveraging multiple data sources and coordinating with cross-functional teams.

  • Proficiency with EDR platforms (e.g., Falcon), SIEM/SOAR technologies, and network forensics tools (e.g., Zeek, Suricata, Wireshark) to support deep investigations.

  • Advanced investigative skills, including host- and network-level log analysis, endpoint telemetry review, and use of threat intelligence to determine scope and impact.

  • Strong knowledge of Windows, macOS, and Linux internals, as well as digital forensics techniques for memory, disk, and network artifact analysis.

  • Proven ability to conduct in-depth research on topics that support team operations and improve investigative capabilities, and to translate findings into actionable outcomes.

  • Solid understanding of network protocols (HTTP/S, DNS, SMTP, SMB, Kerberos) and the ability to analyze packet captures.

  • Strong written and verbal communication skills, with the ability to present investigative findings and recommendations to both technical and non-technical stakeholders.

  • Experience conducting cloud-focused incident response in AWS, Azure, or GCP environments.

  • Ability to design and deliver scenario-based training to enhance investigative skills and operational readiness.

Bonus Points:

  • Advanced scripting or development experience (Python, PowerShell, Bash, or Perl) to create custom investigative tooling, automate complex data analysis, or integrate new data sources into investigative workflows.

  • Expertise as a SIEM power user, capable of executing advanced, investigation-driven searches, building specialized dashboards, and developing or refining high-fidelity detections.

  • Proven track record of publishing threat research, presenting at security conferences, or contributing to industry-wide knowledge sharing.

Education:

  • A bachelor’s or master’s degree in Computer Science, Cybersecurity, Digital Forensics, or a related field is welcome — but not required. Candidates who can demonstrate equivalent, hands-on experience in incident response, threat research, or digital forensics will receive full consideration.

  • Applicable security certifications (e.g., GCFA, GREM, GNFA, GCTI).

#LI-Remote

#LI-AP1

This role will require the candidate to periodically undergo and pass additional background and fingerprint check(s) consistent with government customer requirements.

Benefits of Working at CrowdStrike:

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs 

  • Competitive vacation and holidays for recharge  

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Find out more about your rights as an applicant.

CrowdStrike participates in the E-Verify program.

Notice of E-Verify Participation

Right to Work

CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $85,000 - $120,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.

For detailed information about the U.S. benefits package, please click here

Top Skills

Bash
Edr Platforms
Network Forensics Tools
Perl
Powershell
Python
SIEM
Soar Technologies

What the Team is Saying

Andrew C.
Lauren P.
Brian P.
Alexa Z.
Theo K.
Sara I.
Lam N.
Lauren B.
Adeeb C.
Kristan C.
Alena C.
Thaddeus M.
Alyssa J.
KT T.
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Austin, TX
10,000 Employees
Year Founded: 2011

What We Do

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks.

The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team.

We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?

Why Work With Us

We have a culture that celebrates achievement, encourages flexibility and innovation and thrives on teamwork. We all work towards a single mission: to stop breaches. This common goal drives a sense of community and connection among our people across the globe.

Gallery

Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery
Gallery

CrowdStrike Offices

Hybrid Workspace

Employees engage in a combination of remote and on-site work.

Typical time on-site: Flexible
HQAustin, TX
Singapore
Osaka
Aarhus, DK
Arlington, VA
Barcelona, ES
Bengaluru, IN
Brussels, BE
Bucharest, RO
Cheltenham, GB
Copenhagen, DK
Dubai, Dubai
Irvine, CA
Kirkland, WA
Minneapolis, MN
Mumbai, IN
New Delhi, IN
Pune, IN
Reading, GB
Riyadh, SA
Saint Louis, MO
Sunnyvale, CA
Sydney, Sydney
Tel Aviv-Yafo, IL
Tokyo, Japan
Learn more

Similar Jobs

CrowdStrike Logo CrowdStrike

Regional Sales Manager

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
2 Locations
10000 Employees
85K-128K Annually

CrowdStrike Logo CrowdStrike

Sr. Intelligence Analyst - APAC Mission (Remote)

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
USA
10000 Employees
85K-120K Annually

CrowdStrike Logo CrowdStrike

Senior Data Engineer

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
2 Locations
10000 Employees
125K-180K Annually

CrowdStrike Logo CrowdStrike

Sr. Security Researcher - Mobile Malware Reverse Engineer (Remote)

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
USA
10000 Employees
85K-120K Annually

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account