Incident Response Sr. Consultant (remote)

CrowdStrike CrowdStrike · Enterprise · Spain, United Kingdom · Remote

CrowdStrike is seeking a Senior Incident Response Consultant to join their cybersecurity team. The role involves investigating advanced threats, performing forensic analysis, and developing new methods to hunt for malicious actors across large datasets. This position requires strong technical skills in incident response, computer forensics, and network analysis, with the ability to communicate findings to various stakeholders. The role is part of a mature cybersecurity company that utilizes an AI-native platform.

What you'd actually do

  1. Serve as part the technical team on incident response engagements
  2. Develop and use new methods to hunt for bad actors across large sets of data.
  3. Work under the direction of project leadership and outside counsel to conduct intrusion investigations
  4. Perform host and/or network-based forensics across Windows, Mac, and Linux platforms.
  5. Support the production of high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including customer management, regulators, and legal counsel .

Skills

Required

  • Incident Response experience
  • Computer Forensic Analysis experience
  • Network Forensic Analysis knowledge
  • Reverse Engineering ability
  • Incident Remediation understanding
  • Network Operations and Architecture/Engineering knowledge
  • Cloud Incident Response knowledge (AWS, Azure, or GCP)
  • Strong communication skills

Nice to have

  • Experience conducting or managing incident response investigations for organisations, investigating targeted threats such as the Nation-State, E-Crime, and Hacktivists.
  • Background using forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
  • Strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs.
  • Ability to understand the capabilities of static and dynamic malware analysis.
  • Strong understanding of targeted attacks and able to support creating customized tactical and strategic remediation plans for compromised organizations.
  • Understanding of secure network architecture and strong background in performing network operations.
  • Knowledge of AWS, Azure, or GCP incident response methodologies.
  • Ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.

What the JD emphasized

  • Incident Response
  • Computer Forensic Analysis
  • Network Forensic Analysis
  • Reverse Engineering
  • Incident Remediation
  • Network Operations and Architecture/Engineering
  • Cloud Incident Response
  • Communications