RESUME AND JOB
CrowdStrike
CrowdStrike is a global leader in cybersecurity, protecting the people, processes, and technologies that drive modern organizations. Since 2011, our mission has remained unwavering: stop breaches before they occur. We've redefined modern security with the world's most advanced AI-native platform, the Falcon platform, which delivers cloud-native protection powered by cutting-edge artificial intelligence and machine learning. Our customers across all industries rely on CrowdStrike to keep their businesses running, communities safe, and lives moving forward. As a mission-driven company, we foster a remote-first culture that empowers every CrowdStriker with flexibility and autonomy to own their careers. We're passionate about innovation, customer success, and building a collaborative community.
The Security Researcher role (Remote, GBR) within CrowdStrike Intelligence's Applied Research Cell (ARC) is at the forefront of battling state-sponsored adversaries and criminal actors. This highly technical position combines world-class intelligence analysis with deep-dive reverse engineering and malicious code analysis. You'll support a pipeline of fully automated tools that process millions of malicious files daily, extracting actionable indicators and operational insights at scale. Focused on enhancing our internal toolchain for tracking botnets, this role intersects threat analysis and software development, contributing to tracking over a hundred adversary groups. Ideal for those with large-scale malware analysis experience and custom tool development skills, you'll increase visibility into the global threat landscape while supporting intelligence analysts, incident responders, and threat hunters.
Develop and maintain automated systems for large-scale malware processing, unpacking, and indicator extraction. Identify bottlenecks and areas for improvement in analysis workflows, processes, and automated systems.
Plan and execute development of frontend and backend systems in cybersecurity, cyber threat intelligence, and large-scale malware processing contexts. Balance pragmatic short-term solutions with long-term strategies and vision.
Find creative solutions for technical and non-technical problems, automating analysis workflows. Enhance CrowdStrike's internal toolchain specifically for botnet tracking, ensuring scalability and efficiency.
Proficiency in English (written and spoken) with strong communication skills to express complex ideas verbally and graphically. Knowledge of programming and scripting languages, particularly Python. Profound understanding of software architecture and development. Creativity, strong analytical skills, excellent problem-solving, and the ability to work independently or collaboratively on complex projects.
BA/BS degree in Computer Science or a related field, or equivalent experience.
Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes like unpacking malware. Low-level programming (e.g., C), Dockerized application development, 5+ years related experience with 3+ years in static/dynamic malicious code reverse engineering. Multi-platform experience (Linux, macOS, mobile) and intelligence background are pluses.
CrowdStrike offers market-leading compensation and equity awards. Enjoy comprehensive physical and mental wellness programs, competitive vacation and holidays for recharge, paid parental and adoption leaves, and professional development opportunities for all employees. Build connections through Employee Networks, geographic groups, and volunteer opportunities. Our vibrant remote-first culture includes world-class amenities and Great Place to Work™ certification globally. We're committed to equal opportunity, supporting veterans and individuals with disabilities.
At CrowdStrike, career growth is owner-driven in our remote-first culture. Access limitless opportunities to advance in cybersecurity, from threat intelligence to engineering leadership. Our mission to stop breaches fuels relentless innovation, providing hands-on experience with the Falcon platform and global threat data. Professional development programs ensure you thrive at any level, with autonomy to shape your path.
Join a mission that matters: stopping breaches with the Falcon platform's AI-native power. Thrive in a remote-first culture valuing passion, innovation, and customer focus. Contribute to real-world impact by tracking adversaries and protecting organizations worldwide. With top compensation, benefits, and a belonging-focused environment, CrowdStrike empowers you to make a difference in cybersecurity.
Yes, fully remote in the United Kingdom (GBR).
Enhancing automated malware analysis tools, especially for botnet tracking, at the intersection of threat intel and software development.
Primarily large-scale processing across multiple platforms like Linux, macOS (experience a plus).
It's a bonus, but strong Python, software dev, and analytical skills are essential.
Your tools will integrate with Falcon's ecosystem, processing data to deliver insights that power customer protection.
110,000 - 180,000 GBP / yearly
* This is an estimated range based on market data and may vary based on experience and qualifications.
Get personalized recommendations to optimize your resume specifically for Security Researcher at CrowdStrike in United Kingdom - Apply Now!. Takes only 15 seconds!
Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.
Answer 10 quick questions to check your fit for Security Researcher at CrowdStrike in United Kingdom - Apply Now! @ CrowdStrike.

No related jobs found at the moment.

© 2026 Pointers. All rights reserved.

CrowdStrike
CrowdStrike is a global leader in cybersecurity, protecting the people, processes, and technologies that drive modern organizations. Since 2011, our mission has remained unwavering: stop breaches before they occur. We've redefined modern security with the world's most advanced AI-native platform, the Falcon platform, which delivers cloud-native protection powered by cutting-edge artificial intelligence and machine learning. Our customers across all industries rely on CrowdStrike to keep their businesses running, communities safe, and lives moving forward. As a mission-driven company, we foster a remote-first culture that empowers every CrowdStriker with flexibility and autonomy to own their careers. We're passionate about innovation, customer success, and building a collaborative community.
The Security Researcher role (Remote, GBR) within CrowdStrike Intelligence's Applied Research Cell (ARC) is at the forefront of battling state-sponsored adversaries and criminal actors. This highly technical position combines world-class intelligence analysis with deep-dive reverse engineering and malicious code analysis. You'll support a pipeline of fully automated tools that process millions of malicious files daily, extracting actionable indicators and operational insights at scale. Focused on enhancing our internal toolchain for tracking botnets, this role intersects threat analysis and software development, contributing to tracking over a hundred adversary groups. Ideal for those with large-scale malware analysis experience and custom tool development skills, you'll increase visibility into the global threat landscape while supporting intelligence analysts, incident responders, and threat hunters.
Develop and maintain automated systems for large-scale malware processing, unpacking, and indicator extraction. Identify bottlenecks and areas for improvement in analysis workflows, processes, and automated systems.
Plan and execute development of frontend and backend systems in cybersecurity, cyber threat intelligence, and large-scale malware processing contexts. Balance pragmatic short-term solutions with long-term strategies and vision.
Find creative solutions for technical and non-technical problems, automating analysis workflows. Enhance CrowdStrike's internal toolchain specifically for botnet tracking, ensuring scalability and efficiency.
Proficiency in English (written and spoken) with strong communication skills to express complex ideas verbally and graphically. Knowledge of programming and scripting languages, particularly Python. Profound understanding of software architecture and development. Creativity, strong analytical skills, excellent problem-solving, and the ability to work independently or collaboratively on complex projects.
BA/BS degree in Computer Science or a related field, or equivalent experience.
Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes like unpacking malware. Low-level programming (e.g., C), Dockerized application development, 5+ years related experience with 3+ years in static/dynamic malicious code reverse engineering. Multi-platform experience (Linux, macOS, mobile) and intelligence background are pluses.
CrowdStrike offers market-leading compensation and equity awards. Enjoy comprehensive physical and mental wellness programs, competitive vacation and holidays for recharge, paid parental and adoption leaves, and professional development opportunities for all employees. Build connections through Employee Networks, geographic groups, and volunteer opportunities. Our vibrant remote-first culture includes world-class amenities and Great Place to Work™ certification globally. We're committed to equal opportunity, supporting veterans and individuals with disabilities.
At CrowdStrike, career growth is owner-driven in our remote-first culture. Access limitless opportunities to advance in cybersecurity, from threat intelligence to engineering leadership. Our mission to stop breaches fuels relentless innovation, providing hands-on experience with the Falcon platform and global threat data. Professional development programs ensure you thrive at any level, with autonomy to shape your path.
Join a mission that matters: stopping breaches with the Falcon platform's AI-native power. Thrive in a remote-first culture valuing passion, innovation, and customer focus. Contribute to real-world impact by tracking adversaries and protecting organizations worldwide. With top compensation, benefits, and a belonging-focused environment, CrowdStrike empowers you to make a difference in cybersecurity.
Yes, fully remote in the United Kingdom (GBR).
Enhancing automated malware analysis tools, especially for botnet tracking, at the intersection of threat intel and software development.
Primarily large-scale processing across multiple platforms like Linux, macOS (experience a plus).
It's a bonus, but strong Python, software dev, and analytical skills are essential.
Your tools will integrate with Falcon's ecosystem, processing data to deliver insights that power customer protection.
110,000 - 180,000 GBP / yearly
* This is an estimated range based on market data and may vary based on experience and qualifications.
Get personalized recommendations to optimize your resume specifically for Security Researcher at CrowdStrike in United Kingdom - Apply Now!. Takes only 15 seconds!
Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.
Answer 10 quick questions to check your fit for Security Researcher at CrowdStrike in United Kingdom - Apply Now! @ CrowdStrike.

No related jobs found at the moment.

© 2026 Pointers. All rights reserved.