Sr. Security Researcher, Tac Cloud (remote)

CrowdStrike CrowdStrike · Enterprise · United Kingdom, Germany · Remote

This role focuses on researching cloud adversary activities using cloud service provider logs, reverse engineering malicious code, and building automation systems for threat detection and intelligence reporting. While it uses AI-powered tools and contributes to an AI-native platform, the core craft is cybersecurity research and analysis, not direct AI/ML model development.

What you'd actually do

  1. Reconstruct, investigate, and track cloud intrusions leveraging cloud service provider activity logs (AWS CloudTrail, Azure Activity Logs) and document findings.
  2. Enhance understanding of observed cloud activity by reproducing the activity in a test cloud environment.
  3. Create tools to automate analysis tasks and tracking of threat actors.
  4. Write cloud-activity-based (KQL, Amazon Athena), host-based (Yara) and network-based (Snort/Suricata) signatures suited for large-scale hunting, detection, and tracking of threats.
  5. Perform a technical analysis and reverse engineering of tools related to threat activity within the cloud environment or as part of cloud-conscious intrusions

Skills

Required

  • Understanding of cloud security concepts in particular identity and access management (IAM).
  • Ability to reconstruct incidents based on cloud activity logs from at least one major cloud service provider (AWS, Azure, or GCP)
  • Ability to express complex technical and non-technical concepts in written, verbal and graphical products for all levels of readership, including actionable mitigation and detection guidance.
  • Knowledge of programming and scripting languages, in particular Python.
  • Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc).
  • Ability to identify and classify malicious tooling through development of signatures that can be used for tracking and hunting purposes.
  • Ability to interpret raw network data and to develop network signatures, as well as custom protocol decoders and decryption tools.

Nice to have

  • Experience developing detections with KQL and Amazon Athena
  • Proven track record of relevant experience in the cloud security field
  • A background in intelligence is a plus.
  • Relevant cloud certifications are a plus.

What the JD emphasized

  • cloud security concepts
  • cloud activity logs
  • Python
  • reverse engineering tools
  • signatures