Sr. Security Engineer - Product Abuse (Remote)

NZD Remote

Applications have closed

CrowdStrike

CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform for protecting endpoints, cloud workloads, identities and data.

View all jobs at CrowdStrike

​​#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.

About the Role:

Product Security is seeking a Security Engineer for its Product Abuse team to focus on threat activity related to eCrime adversaries. This position will be primarily focused on threat hunting operations, collaborative response efforts, and product enhancements to disrupt threat actors. The Security Engineer will be required to operate at both the strategic and tactical level as part of a close-knit team where collaboration is a critical driver for mission success.

What You’ll Do:

  • Lead threat hunting operations against emergent threat activity to determine impact and resolution

  • Conduct collaborative response efforts with cross-functional teams

  • Drive and promote product security enhancements in the platform

  • Develop proactive prevention & detection capabilities for evolving TTPs

  • Instrument purpose-built event driven tooling to drive hunting efficiency

  • Advocate for preemptive real-time response processes

What You’ll Need:

  • Motivated self-starter with 5+ years experience in a cybersecurity or threat intelligence environment, with a focus on threat hunting and tooling

  • Comprehensive, practical knowledge of intrusion analysis

  • Familiarity with threat hunting in large SIEM environments (e.g., LogScale, Splunk)

  • Experience in incident response, preferably in a role focusing on SaaS platforms and data-rich environments

  • Familiarity with computer networking fundamentals, computer network operations (CNO), host-based forensics, and network traffic monitoring

  • Capability in scripting language (e.g., Python/Perl/Ruby) to automate processes and extend your toolkit

  • Understanding of technical terminology, tactics, techniques, and procedures employed by threat actors

  • Knowledge of the evolving threat landscape to support an understanding of current and future impacts

  • Passionate about taking the initiative to identify and develop enrichments and enhanced visibility

  • Enthusiasm for collaboration, including working in a team-oriented environment and across functional teams to leverage subject matter expertise

#LI-MF1
#LI-SF1
#LI-Remote

Benefits of Working at CrowdStrike:

  • Remote-first culture

  • Market leader in compensation and equity awards with option to participate in ESPP in eligible countries

  • Competitive vacation and flexible working arrangements

  • Physical and mental wellness programs 

  • Paid parental leave, including adoption 

  • A variety of professional development and mentorship opportunities

  • Access to CrowdStrike University, LinkedIn Learning and Jhanna

  • Offices with stocked kitchens when you need to fuel innovation and collaboration

  • Birthday time-off in your local country

  • Work with people who are passionate in our mission and Great Place to Work certified across the globe

We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

CrowdStrike is committed to maintaining an environment of Equal Opportunity and Affirmative Action. If you need reasonable accommodation to access the information provided on this website, please contact Recruiting@crowdstrike.com​, for further assistance.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  7  0  0

Tags: Cloud CrowdStrike Forensics Incident response Monitoring Perl Product security Python Ruby SaaS Scripting SIEM Splunk Threat intelligence TTPs

Perks/benefits: Career development Competitive pay Equity / stock options Flex hours Flex vacation Parental leave

Region: Remote/Anywhere

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.