• 1Search for courses by Study Area, Level and Location
  • 2We deliver you all the matched results
  • 3Choose one or more course providers to contact you

Distance from location (kms)

Exact 5 10 25 50 100

Posted since

All 2 Days 1 Week 2 Weeks 1 Month

Sort results by

Relevance Date



Threat Response Analyst (Remote)

CrowdStrike - Sydney, NSW

Source: uWorkin

Source: uWorkin


At CrowdStrike we’re on a mission - to stop breaches. Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner. We’ve earned numerous honors and top rankings for our technology, organization and people – clearly confirming our industry leadership and our special culture driving it. We also offer flexible work arrangements to help our people manage their personal and professional lives in a way that works for them. So if you’re ready to work on unrivaled technology where your desire to be part of a collaborative team is met with a laser-focused mission to stop breaches and protect people globally, let’s talk.

About The Role

The CrowdStrike OverWatch Elite team is seeking a motivated individual with strong technical skills and customer centric personality to act as a trusted advisor to OverWatch Elite’s managed threat hunting customers. OverWatch Elite Threat Response Analysts fulfil client requests, exchange threat intelligence with customers, and act as liaison between customers and threat hunting teams.

The OverWatch Elite team delivers ‘White Glove’ service to augment OverWatch threat hunting and provides a personal consultative experience to customers that expect a top-tier, proactive, professional service.

To be successful in this role, you must be a motivated self-starter, be committed to ongoing self-education, possess strong customer service skills, excellent technical problem-solving skills, be obsessed with ‘Wowing’ the customer and disrupting the adversary.


  • Generate high-quality customer deliverables to meet the criteria and expectations of the service such as:
  • Hunting for threats, anomalies and cyber-related disruptions on customer endpoints
  • Performing threat analysis, deep-dives and incident assessments
  • Researching and assessing customer’s threats and IOCs
  • Conducting ongoing customer environment assessments
  • Authoring tailored Falcon security reports for customer endpoints
  • Holding quarterly customer security report presentations
  • Conducting research and presenting threat briefings to a large audience
  • Provide subject matter expertise and insight to clients about industry attack trends and defences by developing and maintaining deep awareness and understanding of evolving threats, adversaries and intrusion trends
  • Development and delivery of impactful threat briefings, reporting and presentations to customers by providing actionable intelligence
  • Collaborate interdepartmental teams to help detect new, interesting or unique threats and mitigations based on hunting observations
  • Build strong advisory relationships with customers and continuously exceeding client expectations
  • Guide clients through Threat Response findings and providing subject matter expertise for response activities such as taking remediation actions in situations that require action to be taken
  • Gather client input and feedback across customer base to influence service roadmaps


Key Qualifications:
  • Trustworthy, self-starter, good communicator, collaborative, dependable, and driven personality
  • Bachelor’s degree in information security or related discipline or the equivalent of six (6) years or more in the industry as job experience
  • Two (2) or more years of significant client-facing relationship management experience
  • Prior cyber experience in four (4) or more of the following:
  • Active threat hunting (open source or commercial tooling)
  • Intrusion analysis
  • Managed or enterprise information security services
  • Incident response
  • Endpoint forensics (Windows, MAC, or Linux)
  • Malware analysis
  • Penetration testing
  • Network defence
  • Threat hunting
  • Information security consulting
  • Bonus points for experience with big-data processing tools such as Splunk, Humio, Logstash, Kibana, etc.
  • Solid understanding of common enterprise technologies, processes and technology
  • Strong written and verbal communication skills
  • Proven ability to convey extremely technical concepts to audiences with varying technical prowess
  • Strong understanding of MITRE ATT&CK techniques / sub-techniques and ability to articulate TTPs to customers
  • Proven ability and confidence to tailor communication to a wide range of stakeholders from Security Analysts to CIOs

Benefits Of Working At CrowdStrike
  • Market leader in compensation and equity awards
  • Competitive vacation policy
  • Comprehensive health benefits
  • Paid parental leave, including adoption
  • Flexible work environment
  • Wellness programs
  • Stocked fridges, coffee, soda, and lots of treats

We are committed to building an inclusive culture of belonging that not only embraces the diversity of our people but also reflects the diversity of the communities in which we work and the customers we serve. We know that the happiest and highest performing teams include people with diverse perspectives and ways of solving problems so we strive to attract and retain talent from all backgrounds and create workplaces where everyone feels empowered to bring their full, authentic selves to work.

CrowdStrike is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law.