Principal Consultant, Cloud Incident Response (Remote)
USA TX Remote
Micron TechnologyMicron is a world leader in innovative memory and storage solutions. View our product portfolio, discover solutions, read industry updates and more.
#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.
About the Role:
CrowdStrike is looking for highly motivated, self-driven, technical consultants dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. Our CrowdStrike Services team offers opportunities to expand your skill set through a wide variety of engagements including front page incident response investigations for organizations you’ll find on the annual Fortune 100 list. A Principal Consultant in CrowdStrike’s Cloud Incident Response Team would be responsible for assisting our clients in identifying, responding to, and containing attacker activity in their AWS, Azure and M365, and/or GCP environments, as well as improving the team’s incident response capabilities by contributing to and spearheading automation projects.
Am I a Cloud IR Principal Consultant Candidate?
Do you find yourself interested in and keeping up with the latest Azure, M365, AWS, and GCP vulnerabilities and breaches?
Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?
Do you crave new and innovative work that actually matters to customers?
Do you have an Incident Response or Information Security background that you’re not fully utilizing?
Are you capable of operating as an individual contributor?
Are you an effective internal and customer-facing team leader?
Do you love working around like-minded, smart people who you can learn from and mentor on a daily basis?
What You'll Do:
Manage projects and perform forensic analysis on incident response engagements involving Azure, M365, AWS, or GCP data.
Manage projects and perform analysis on technical assessments looking for compromise or security misconfigurations in Azure, M365, AWS, or GCP.
Manage projects and deliver adversary simulation (purple team) exercises in Azure, M365, AWS and GCP.
Produce high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including customer management, and legal counsel.
Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
What You'll Need:
Successful candidates will have experience in one or more of the following areas:
Cloud Incident Response: knowledge in AWS, M365, Azure, or GCP incident response methodologies.
Cloud Operations: familiarity with how modern workloads work in the cloud - DevOps, CICD pipelines, containers, functions, etc. and related security defenses and pitfalls.
Incident Response: experience supporting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists.
In-depth knowledge of Cloud Service Providers Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations related to major cloud platforms.
Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.
Additionally, all candidates must possess the following qualifications:
Capable of completing technical tasks without supervision.
Desire to grow and expand both technical and soft skills.
Strong project management skills.
Contributing thought leader within the incident response industry.
Ability to foster a positive work environment and attitude.
BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Applicants without a degree but with relevant work experience and/or training will be considered.
#LI-DL1This role may require the candidate to periodically undergo and pass alcohol and/or drug test(s) during the course of employment.
Benefits of Working at CrowdStrike:
Market leader in compensation and equity awards
Competitive vacation and flexible working arrangements
Comprehensive and inclusive health benefits
Physical and mental wellness programs
Paid parental leave, including adoption
A variety of professional development and mentorship opportunities
Offices with stocked kitchens when you need to fuel innovation and collaboration
We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.
CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact Recruiting@crowdstrike.com, for further assistance.
CrowdStrike participates in the E-Verify program.salary range for this position in the U.S. is $125,000 - $185,000 per year + variable/incentive compensation + equity + benefits. A candidate’s salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications and location.Expected Close Date of Job Posting is:03-09-2024
More jobs like this
Washington, District of Columbia, … Washington, District of Columbia, United States - … Full TimeSenior Senior-levelUSD 97K - 140K * USD 97K+ *
Cybersecurity Incident Response Analyst - Tier 3Analytics Automation CISSP Computer Science EDR Forensics +10
401(k) matching Competitive pay Health care
Walnut Creek, California, United … Walnut Creek, California, United States Full TimeSenior Senior-levelUSD 150K - 240K USD 150K+
Senior Security Operations EngineerApplication security Automation AWS Azure Blue team CCPA +19
Career development Competitive pay Flex hours Flex vacation Health care
Chicago, IL, United States Chicago, IL, United States Full TimeSenior Senior-levelUSD 151K - 208K USD 151K+
Palo Alto Networks
Principal Consultant, DFIR, Reactive Services (Unit 42) - RemoteC Computer Science DFIR EnCase Firewalls Forensics +6
Career development Conferences Medical leave Salary bonus
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Penetration Tester jobs
- Open Senior Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Architect jobs
- Open Cybersecurity Analyst jobs
- Open Security Operations Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Senior Security Architect jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Chief Information Security Officer jobs
- Open Security Specialist jobs
- Open Ingénieur DevSecops H/F jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Infosec Risk Manager jobs
- Open Agile-related jobs
- Open C-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open CISM-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Analytics-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open CISA-related jobs
- Open SaaS-related jobs
- Open DevOps-related jobs
- Open Threat intelligence-related jobs
- Open Security Clearance-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open APIs-related jobs
- Open Forensics-related jobs
- Open IDS-related jobs
- Open Splunk-related jobs