Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
CR

CrowdStrike

via Workday

Apply Now
All our jobs are verified from trusted employers and sources. We connect to legitimate platforms only.

Sr. Threat Analyst, Linux (Remote)

Anywhere
full-time
Posted 8/13/2025
Direct Apply
Key Skills:
Linux
Mac Operating Systems
Public Cloud Environments
Reverse Engineering
Malware Operations
Python
Binary Analysis
Threat Research
Intelligence Collection
Threat Management
Security Problem Solving
Machine Learning
AWS
Azure
Windows OS Internals
Exploit Development

Compensation

Salary Range

$135K - 215K a year

Responsibilities

The Sr. Threat Analyst will analyze breaches and killchains involving malware and detections, focusing on improving detection capability and efficiency. This role will also involve leading efforts to refine product detections and collaborating with internal teams on threat detection inquiries.

Requirements

Candidates should have deep technical expertise in Linux or Mac operating systems and a strong background in reverse engineering malware. Proficiency in Python and experience with public cloud environments are also required.

Full Description

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: At CrowdStrike we’re on a mission - to stop breaches. Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner. We’ve earned numerous honors and top rankings for our technology, organization and people – clearly confirming our industry leadership and our special culture driving it. The opportunity: Our CrowdStrike Data Science Machine Learning Operations and Response Team is looking for a Sr Threat Analyst who is both customer- and team-focused. This role will include both response and pro-active aspects. This role will be perfect for anyone who has experience involving detections and/or reverse engineering. The primary responsibility of this role will be to analyze breaches and killchains involving malware and detections. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Experience with security detections by machine learning models is a plus. Bring your passion for helping internal partners resolve questions about detections of potentially malicious activity by machine learning and our detection platform. Our goal for the team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization - including detection efficacy and managing false positive detections. This role will work most closely with internal teams such as Falcon Complete, Falcon Overwatch, Data Scientists and the Malware Research Center in Data Science. What You'll Do: Lead efforts to review and refine product detections to ensure they meet and exceed company standards. Identify and drive improvements in false positive detection management through deep technical analysis and process enhancements. Analyze files and killchains across different platforms (Linux, public Clouds, Mac, and Windows) to assess legitimacy and identify malicious behaviors. Act as a senior escalation point for internal teams regarding complex customer threat detections. Collaborate cross-functionally with threat research, engineering, and incident response teams to drive detection efficacy. What You'll Need: Deep technical expertise in Linux or Mac operating systems, including internals and threat behaviors. Demonstrated subject matter expertise in public Cloud environments, preferably AWS or Azure. Strong background in reverse engineering malware and malware operations. Solid proficiency in Python, with additional experience in other scripting/programming languages a plus. In-depth understanding of binary analysis, including file attributes, imports/exports, and common packing techniques. Advanced analytical skills, including practical experience with threat research, intelligence collection, and structured analysis methodologies. Strong grasp of threat/risk assessment and threat management frameworks. Proven ability to break down complex security problems into actionable solutions. Bonus Points: Experience in a Security Operations Center (SOC), threat hunting, or a high-tempo incident response environment. Expert-level knowledge of MacOS and/or Linux, with experience in threat detection, analysis, or EDR tooling on those platforms. Advanced knowledge of the control plane and data plane of public cloud providers. Advanced knowledge of Windows OS internals and API behavior. Familiarity with tools and techniques used in targeted and criminal cyber-intrusions. Background in exploit development or vulnerability research. Knowledge of programming languages such as C, C++, Java, and Assembly. Experience leveraging machine learning for threat detection use cases. Education: • BA/BS or MA/MS degree in Computer Science, Information Security, or related field – or equivalent professional experience. #LI-Remote #LI-JC3 This role will require the candidate to periodically undergo and pass additional background and fingerprint check(s) consistent with government customer requirements. Benefits of Working at CrowdStrike: Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified™ across the globe CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance. Find out more about your rights as an applicant. CrowdStrike participates in the E-Verify program. Notice of E-Verify Participation Right to Work CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $135,000 - $215,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off. For detailed information about the U.S. benefits package, please click here. Expected Close Date of Job Posting is:10-06-2025 CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.

This job posting was last updated on 8/14/2025

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt