at CrowdStrike, Inc. in Springfield, Illinois, United States
Job Description
CrowdStrike, Inc.Full time
R18488
About the Role:
CrowdStrike’s Endpoint Protection (EPP) Content Research team is seeking a motivated professional with strong technical skills to analyze Linux and MacOS based malware. The Content Research team is focused on improving detection capability and efficiency for the Falcon Host platform through threat analysis of ongoing attacks by criminal and state sponsored actors impacting our customer base along with researching emerging TTPs from online publications and/or purple teaming exercises.
What You'll Do:
The position entails researching malware families and malicious behavior through deep-dive reverse engineering techniques. Researchers partner with other teams to implement high fidelity behavioral coverage based on their analysis.
Content Research is dedicated to responding to our customer's security needs as threats evolve and ensuring CrowdStrike maintains coverage of all relevant threats regardless of the source of attack. Falcon Host is a unique endpoint detection and response solution and security researchers on the team will have the opportunity to translate their research findings into impactful detection capabilities backed by an unprecedented number of events at their disposal for analytic initiatives.
What You'll Need:
Required:
Experience leading research initiatives that outline technical tasks, goals, experiments, and people with larger overarching strategies included
Experience reverse engineering and analyzing Mach-O/ELF binaries
Experience scripting in languages like Python or bash
Experience in system, network, security operations, or an equivalent role
Strong knowledge of one or more low level architectures (x86/ARM/etc)
Strong knowledge of C/C++, Swift, or Rust
Ability to explain the relevant Mach-O/ELF features for malware analysis
Ability to create technical write-ups for research outcomes
Ability to work independently in unstructured situations
Ability to provide technical expertise and mentorship on Mac and Linux system internals
Preferred:
Experience in a security operations center responding to incidents on Linux or MacOS systems
Experience creating IOA/IOC detection rules
Advanced understanding of Linux or MacOS internals
Strong knowledge of mitigation techniques (ASLR, stack cookies, NX)
Strong Knowledge of file formats (ELF, Mach-O, OLE, etc) including binary protection strategies
Advanced development experience on projects in C, C++, Golang, or Rust
Strong Knowledge of dynamic and static binary analysis with experience using tools like IDA/Ghidra/Binary Ninja/Radare2
Strong understanding of the threat landscape targeting Mac and Linux operating systems
Education:
Bachelor’s degree in computer science, mathematics, information technology or work related disciplines from an accredited college or university. Equivalent work, military or self-guided experience is also acceptable.
#LI-NT1
#LI-Remote
#HTF
We are committed to fostering a culture of belonging where everyone feels seen, heard, valued for who they are and empowered to succeed. Our approach to cultivating a diver
PI240724390
CrowdStrike, Inc. is an Equal Opportunity Employer and does not discriminate against any applicants for employment based on their race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, age, physical or mental disability, genetic information, veteran status, uniformed service member status, or any other status protected by law.