CrowdStrike Logo

CrowdStrike

Sr. Threat Researcher (Remote, IND)

Posted 3 Hours Ago
Be an Early Applicant
Remote or Hybrid
Hiring Remotely in India
Senior level
Remote or Hybrid
Hiring Remotely in India
Senior level
The Senior Threat Researcher will lead threat detection innovations, mentor researchers, perform malware analysis, and architect scalable solutions to combat sophisticated threats.
The summary above was generated by AI

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

As a Senior Threat Researcher, you will be a technical leader and subject matter expert within the Threat Research team, driving innovation in threat detection and response capabilities. This is an individual contributor position focused on technical excellence and thought leadership, requiring deep expertise in reverse engineering, malware analysis, and automation. You will take ownership of the most complex threats facing CrowdStrike customers, architect scalable automation solutions, and serve as a technical mentor to researchers across all experience levels. Your work will directly influence the direction of threat research methodologies, tooling, and detection strategies that protect millions of endpoints worldwide.

About the team:

The CrowdStrike Malware Research Center is the core of Falcon's malware detection and response capabilities. The team has a focus on understanding the threat landscape and sets the target for what Falcon should be identifying and preventing. Additionally, the MRC is responsible for understanding our capabilities, and mapping how well our machine learning and behavioral protection capabilities are doing against those threats. Where there is a gap, the MRC takes action to improve our detection stance, and improve our overall protection story. MRC also performs pathfinding research to enable technology development using innovation, prototyping and bleeding edge machine learning to support our flagship Falcon product. There are many parts of CrowdStrike working towards protecting customer environments, and the MRC works across all of them to ensure we are on target and providing the best protection for our current Threat landscape.

Leading the charge for understanding the activity of malware today is the Threat Research team. With a focus on malware research, the primary role of the team is to understand relevant threats and techniques used in malware that are threatening our customer's business. The challenge is the enormous scale of malware today and sheer number of samples required to be addressed. This takes a more creative approach than traditional Anti-Virus research, focusing on one sample at a time. The modern threat lab requires an economy of scale through automation and machine learning to allow people to focus on new learnings, and let systems continue to identify malware based on what the team has learned.

What You'll Do:

  • Take ownership of critical technical initiatives and architect scalable automation solutions for malware analysis at scale

  • Serve as a technical mentor to researchers across all experience levels, helping to elevate team capabilities through knowledge sharing and technical guidance

  • Work independently on the most challenging and complex threats, performing deep reverse engineering and analysis

  • Collaborate cross-functionally with Engineering, Product, and Detection teams to translate research findings into production capabilities

  • Design proof-of-concept automation solutions and effectively hand off to engineering teams for production implementation

  • Directly influence the direction of threat research methodologies, tooling, and detection strategies across the organization

  • Drive technical excellence and thought leadership within the team, setting standards for analysis quality and automation practices

  • Build and optimize scalable automation pipelines, including integration with sandbox environments, YARA rule generation, and threat intelligence platforms

  • Produce high-quality technical documentation and reports that effectively communicate complex technical concepts to diverse audiences

What You'll Need:

  • Bachelor's or Master's degree in Computer Science or comparable field

  • 12+ years of experience in the threat research field with a focus on malware analysis and reverse engineering

  • Strong reverse engineering skills on file-based threats, with demonstrated ability to deliver high-quality, in-depth analysis

  • Solid proficiency in disassembly and deep understanding of structured programming, compiler behaviors, and binary analysis techniques. Experience with reverse engineering tools such as IDA Pro, Ghidra, Binary Ninja, x64Dbg, or similar platforms

  • Experience in using machine learning and artificial intelligence for static and dynamic threat detection, including understanding of ML pipelines and model deployment in production environments

  • Strong understanding of file formats for compiled code and scripted files, with ability to analyze and contribute to parsers and feature extraction tools

  • Proficiency in multiple programming languages such as Python, Go, Rust, C++, or similar, with demonstrated ability to build production-quality automation tools and systems

  • Deep familiarity with multiple major Operating Systems (Windows, Linux, Mac), with in-depth knowledge of OS internals, kernel behaviors, and how host systems function at a technical level

  • Experience working with large data sets using tools like Splunk, ElasticSearch-Kibana, or similar platforms, along with knowledge of relational (MySQL, PostgreSQL) and non-relational/NoSQL databases (MongoDB, Cassandra, ElasticSearch)

  • Experience in building scalable automation pipelines for malware analysis, including integration with sandbox environments, YARA rule generation, and threat intelligence platforms

  • Deep working knowledge of malware-based automation workflows and techniques, with demonstrated ability to architect end-to-end automation solutions

  • Strong understanding of MITRE ATT&CK framework to describe and categorize threat behaviors

  • Strong technical communication and writing skills with ability to articulate complex technical concepts clearly and concisely to both technical and non-technical audiences

  • Track record of mentoring and providing technical guidance to researchers at all levels

  • Ability to influence technical direction and research strategy through deep expertise and thought leadership

Bonus Points:

  • Experience leveraging Generative AI and Large Language Models for threat research automation workflows, including malware analysis, report generation, and threat intelligence synthesis

  • Proven ability to design and implement AI-powered automation solutions that enhance team productivity and scale threat research capabilities

  • Understanding of prompt engineering, AI model integration, and the application of GenAI tools in cybersecurity contexts

  • Proficiency in data visualization and statistical analysis techniques for threat intelligence and research insights

  • Additional reverse engineering expertise around file-less threats, exploits, rootkits, and advanced attack techniques

  • Experience working with certification partners like AV-Test, AV-Comparatives, SE Labs

LI-VJ1

LI-Remote

Benefits of Working at CrowdStrike:

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Top Skills

Automation
Binary Ninja
C++
Elasticsearch
Ghidra
Go
Ida Pro
Malware Analysis
MongoDB
MySQL
Postgres
Python
Reverse Engineering
Rust
Splunk
X64Dbg

Similar Jobs at CrowdStrike

3 Hours Ago
Remote or Hybrid
Senior level
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Threat Researcher III will analyze malware threats, validate defenses against them, automate threat processing, and communicate findings across teams.
Top Skills: CassandraElasticsearchGoMySQLPythonRust
11 Hours Ago
Remote or Hybrid
Mid level
Mid level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Drive new logo acquisition and revenue within a defined territory by executing end-to-end sales cycles, collaborating with SEs and SDRs, forecasting, and managing renewals and upsell opportunities while becoming an expert in CrowdStrike offerings and the competitive landscape.
Top Skills: Cloud-Native SecurityCrowdstrikeEdrSaaS
2 Days Ago
Remote or Hybrid
Senior level
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Sr. Software Engineer will develop feature extraction engines, collaborate with data scientists, and test software systems while working with complex file formats and reverse engineering.
Top Skills: AWSAzureBitbucketC++GCPGitJenkinsJIRAPythonRust

What you need to know about the Ottawa Tech Scene

The capital city of Canada and the nation's fourth-largest urban area, Ottawa has proven a rapidly growing global tech hub. With over 1,800 tech companies, many of which are leaders in their sectors, the city's tech talent now makes up more than 13 percent of its total workforce. This growth is driven not only by the big players like UL Solutions and Dropbox, but also by a thriving startup ecosystem, as new businesses emerge to follow in the footsteps of those that came before them.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account