Resident Responder Consultant (Onsite-Boston)

USA MA Remote

Full Time Mid-level / Intermediate Clearance required USD 95K - 155K

CrowdStrike

CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform for protecting endpoints, cloud workloads, identities and data.

View company page

#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.

About the Role:

Come join the CrowdStrike Platform Operations team and join our mission to protect our most critical customers. The Resident Responder Consultant is responsible for providing dedicated support to customers with implementation, ongoing operational support, threat hunting, and incident response functions using the CrowdStrike platform and related technologies. The Resident Responder Consultant will act as an oversight and technical escalation point for customer security operations center (SOC) team using CrowdStrike and related technologies as well as having responsibility for planning, optimizing, maintaining, and follow on support for the CrowdStrike platform and associated applications.

Specific Opportunity Information:
• Onsite
• Secret Clearance
• Background and drug testing are required

What You’ll Do:

  • Advise customer of Cloud Security best practices, Cloud Security Configuration, and integration to meet business requirements

  • Design, implement, and configure SIEM solutions to collect, correlate, and analyze security events and logs from various sources.

  • Gather and support log sources into Elastic, creating custom detections to help expand holistic security posture visibility

  • Help customers build and mature their security operations and threat detection and response capabilities

  • Develop and maintain correlation rules, filters, and dashboards to improve the accuracy and efficiency of threat detection

  • Align cloud configurations and log sourcing for best practices

  • Guide customers by researching and assessing customer threats and indicators of compromise

  • Create reporting dashboards based on cloud platform security events

  • Act as escalation point cloud platform inquiries and issues

  • Review current cloud and SIEM environments to address any performance and security objectives, gaps, and/or opportunities

  • Optimizes, configures, and tests cloud and SIEM technology deployment to assist with custom detection and dashboard creation as well as log ingestion

  • Work closely and collaboratively onsite with customer security and information technology teams

  • Leverage APIs, builds scripts, and develop processes to support SIEM configuration

  • Act as the technical and/or senior level interface for customer concerns or escalations

  • Maintain awareness of customer environment for upcoming technologies and features releases to assist customer with adoption and operationalizing into their security operations process

What You’ll Need:

  • Bachelor’s degree, in Computer Science, Information Technology, Cybersecurity or a related field, and/or equivalent military or work experience.

  • Active Secret Clearance

  • 5+ years of experience with SIEM administration, configuration, and management

  • 3+ years of client-facing consulting experience

  • Highly knowledgeable on Windows, Mac, and Linux platforms as well as cloud environments such as AWS, GCP, and Azure

  • Working knowledge of Microsoft Office applications, Word, Excel, Access, PowerPoint, etc.

  • Strong communication and collaboration skills

  • Proven ability to convey technical concepts to audiences with varying technical expertise, from analyst to executive levels

  • Broad experience in computer and network systems security

  • Solid analytical/problem solving skills with capability to identify solutions to unusual and complex problems

  • High level of motivation; self-starter; results driven

Bonus Points:

  • Scripting experience: PowerShell, Python, Bash

  • Federal Government workspace experience

  • Relevant certifications such as CISSP, GIAC, or vendor-specific SIEM certifications


#LI-DL1
#LI-Onsite

This role may require the candidate to periodically undergo and pass alcohol and/or drug test(s) during the course of employment.

Benefits of Working at CrowdStrike:

  • Remote-first culture

  • Market leader in compensation and equity awards

  • Competitive vacation and flexible working arrangements 

  • Comprehensive and inclusive health benefits

  • Physical and mental wellness programs

  • Paid parental leave, including adoption 

  • A variety of professional development and mentorship opportunities

  • Offices with stocked kitchens when you need to fuel innovation and collaboration

We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact Recruiting@crowdstrike.com​, for further assistance.

CrowdStrike participates in the E-Verify program.

Notice of E-Verify Participation

Right to Work

CrowdStrike, Inc. is committed to fair and equitable compensation practices. The base salary range for this position in the U.S. is $95,000 - $155,000 per year + variable/incentive compensation + equity + benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location.

Apply now Apply later
  • Share this job via
  • or
Job stats:  10  0  0
Category: Consulting Jobs

Tags: APIs AWS Azure Bash CISSP Clearance Cloud Computer Science CrowdStrike GCP GIAC Incident response Linux PowerShell Python Scripting SIEM SOC Threat detection Windows

Perks/benefits: Career development Competitive pay Equity / stock options Flex hours Flex vacation Health care Parental leave Salary bonus Team events Wellness

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.