CrowdStrike Logo

CrowdStrike

Insider Investigations Analyst (Remote)

Posted Yesterday
Be an Early Applicant
Remote or Hybrid
Hiring Remotely in TX
100K-155K Annually
Mid level
Remote or Hybrid
Hiring Remotely in TX
100K-155K Annually
Mid level
The Insider Investigations Analyst supports insider risk investigations by triaging detections, communicating with end users, providing detailed reports, and ensuring proper documentation while managing investigations and collaborating across departments.
The summary above was generated by AI

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:
CrowdStrike is looking for a highly motivated, self-driven Insider Investigations Analyst to support the Insider Risk Team Program via triage and investigation of detections and take action as appropriate (e.g. live response, containment, escalation, etc). This role is within our CSIRT team and is a remote position available to qualifying applicants.

What You’ll Do:

  • Participate in confidential insider risk investigations

  • Create and implement insider risk related detections

  • Perform detailed and comprehensive investigations, reviewing data from multiple data sources to include, but not limited to, network, host, and open source

  • Communicate with end users regarding potential policy violations when appropriate

  • Assist in data recovery efforts through the creation of comprehensive reports on an as-needed basis

  • Provide senior leadership and executive level staff with active investigations notifications/updates (EXSUMs) in a clear, logical, concise manner

  • Handling confidential or sensitive information with appropriate discretion

  • Assist in regular and sustained alert tuning efforts to minimize false positive results

  • Ensure that all investigations are properly documented and tracked in appropriate case management systems

  • Support Incident Response lifecycle via triage and investigation of detections and action as appropriate (e.g. live response, containment, escalation, etc.)

  • Assist in the development of detection criteria, through ASM (Attack Surface Mapping), across a broad range of technologies and log sources

  • Identify security controls coverage and efficiency gaps in available data/logs and tooling

  • Provide information security summaries containing security metrics as required

  • Participate in incident response and manage escalations as needed

  • Drive efficient process development and documentation for all aspects of the Incident Response lifecycle

  • Provide after-hours support on an on-demand basis

What You’ll Need:

  • Experience with data classification or risk scoring methodologies

  • Excellent verbal and written communication skills with a strong emphasis on attention-to-detail

  • Ability to triage and manage 2-3 investigations simultaneously

  • Ability to work independently and coordinate with multiple internal departments as needed

  • Experience responding to security event alerts, including front-line analysis and escalation, of hacktivist, cybercrime, and APT activity

  • Theoretical and practical knowledge with Mac, Linux, and Windows operating systems

  • Theoretical and practical knowledge with TCP/IP networking and application layers

  • Experience with ASM (Attack Surface Mapping), Threat Hunting/Emulation

  • Experience with access/application/system log analysis, IDS/IPS alerting and data flow, and SIEM-based workflows

  • Experience with security data collection, processing, and correlation

  • Capable of following technical instructions and completing technical tasks without supervision

  • Desire to continually grow and expand both technical and soft skills

  • Contributing thought leader within the incident response industry

  • Ability to foster a positive work environment and attitude

  • Scripting experience (Bash, PowerShell, etc.)

  • Experience with REGEX and data stream editing binaries (SED, AWK, etc.)

  • Experience with host database enumeration and analysis (SQL, SQLITE3)

  • Experience with network analysis (TCPDump, TSHark/WireShark, etc.)

  • Experience with basic static and dynamic host analysis (Order of Volatility, etc.)

  • Experience with basic files analysis (permissions, ownership, metadata) 

  • Working knowledge of INIT, SYSTEMD, LAUNCHD, BIOS/UEFI Boot processes

  • Applicable security certifications (GCIA, GCIH, GCFA, GNFA, GIME, GCCC, GPEN, OSCP, etc.) or equivalent job experience.

  • Obtained or Pursuing an undergraduate degree or direct experience in information/cyber security, information systems, or computer science

Bonus Points:

  • Scripting experience highly desirable (Python, Perl, etc.)

  • Experienced user of Splunk or Falcon LogScale query language

  • Experience with user behavior analytics and profiling tools or methodologies

  • Experience in creating and tuning detection/alert logic to provide greater fidelity and reduce false positives

  • Experience in data loss prevention, data classification, and knowledge of common data loss vectors

  • Previous project management experience desirable

#LI-AI1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs 

  • Competitive vacation and holidays for recharge  

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Find out more about your rights as an applicant.

CrowdStrike participates in the E-Verify program.

Notice of E-Verify Participation

Right to Work

CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $100,000 - $155,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.

For detailed information about the U.S. benefits package, please click here

Top Skills

Asm
Awk
Bash
Information Security Certifications
Linux
macOS
Perl
Powershell
Python
Regex
Sed
SIEM
Splunk
SQL
Tcp/Ip
Threat Hunting
Tshark
Windows
Wireshark

Similar Jobs at CrowdStrike

13 Days Ago
Remote or Hybrid
USA
100K-155K Annually
Mid level
100K-155K Annually
Mid level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Insider Investigations Analyst conducts investigations into insider risks, manages alerts, and collaborates across teams to mitigate security threats while documenting findings thoroughly.
Top Skills: AsmBashLinuxmacOSPowershellRegexSIEMSQLSqlite3Tcp/Ip NetworkingTcpdumpThreat HuntingTsharkWindowsWireshark
3 Hours Ago
Remote or Hybrid
2 Locations
100K-155K Annually
Senior level
100K-155K Annually
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Platform Professional Services Consultant engages in customer support for CrowdStrike technology deployment, configuration, and integration. Responsibilities include working with security teams, leveraging APIs, and assisting customers with incident management.
Top Skills: APIsAWSAzureBashCrowdstrike PlatformGCPMS OfficePowershellPython
3 Hours Ago
Remote or Hybrid
USA
170K-260K Annually
Senior level
170K-260K Annually
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Lead AI initiatives and governance, enhance AI capabilities, and develop internal training programs while collaborating across teams.
Top Skills: Ai GovernanceAi SafetyCalifornia Ai Transparency ActDmaGdprGenerative AiIso 42001Machine LearningNist Ai Rmf

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account