Consultant - Cloud Red Team Blue Team (remote)

CrowdStrike CrowdStrike · Enterprise · United States · Remote

This role is for a Consultant focused on Cloud Red Team Blue Team engagements, supporting customer SOC/IR teams in threat hunting and incident response. The role involves understanding customer controls, making recommendations, managing projects, and identifying long-term enhancements to the CRTBT offering. While the company mentions an 'AI-native platform', the core responsibilities of this specific role are in cybersecurity consulting, threat hunting, and incident response, not in building or directly managing AI/ML models or systems.

What you'd actually do

  1. You will conduct Cloud Red Team Blue Team (CRTBT, also known as Cloud Purple Team) engagements as a Blue Teamer, where you will support the customer’s SOC/IR team in threat hunting and incident response activities as the CrowdStrike Red Teamer uses techniques characteristic of real breach attempts to generate potential detections.
  2. You will work closely with customers to understand existing controls and practices and make recommendations based on detection and response capabilities, as well as manage projects from kickoff call through to report delivery.
  3. Additionally, you will identify and implement long-term enhancements to the CRTBT offering that will better enable clients to stop and recover from breaches.

Skills

Required

  • incident response consulting services
  • MSSP roles
  • public cloud platforms (AWS, Azure infrastructure, Microsoft Entra ID/M365 & GCP)
  • Red Team Blue Team or Purple Team exercises
  • cybersecurity industry experience
  • security engineering
  • detection engineering
  • log search engine/SIEM (Splunk, Azure Sentinel, LogScale, etc.)
  • building and growing strategic relationships with client mid-level managers and executives
  • customer-facing project management
  • customer service
  • information security programs (endpoint security, cloud security, network security, threat intelligence, or security operations centers)
  • fast-paced professional services environment
  • balancing competing priorities
  • technical and creative problem solving
  • analytical expertise
  • client management skills
  • consulting poise
  • oral and written communication skills
  • business acumen

Nice to have

  • AI-native platform

What the JD emphasized

  • 2-3 years experience in incident response consulting services or MSSP roles
  • 1-2 years conducting Red Team Blue Team or Purple Team exercises
  • 5+ years cybersecurity industry experience overall
  • Experience in multiple security technologies, including at least one log search engine/SIEM (Splunk, Azure Sentinel, LogScale, etc.)
  • Experience with building and growing strategic relationships with client mid-level managers and executives
  • Experience in customer-facing project management with a keen eye toward customer service
  • Experience implementing information security programs within domains such as endpoint security, cloud security, network security, threat intelligence, or security operations centers is helpful
  • Demonstrated ability to excel in a fast-paced professional services environment and ability to balance competing priorities while still maintaining focus on details
  • Proven track record in technical and creative problem solving coupled with the analytical expertise to provide quick resolution to problems
  • Excellent client management skills & consulting poise
  • Exceptional oral and written communication skills
  • Strong business acumen