As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About the Role:
As a Senior Threat Researcher, you will be a technical leader and subject matter expert within the Threat Research team, driving innovation in threat detection and response capabilities. This is an individual contributor position focused on technical excellence and thought leadership, requiring deep expertise in reverse engineering, malware analysis, and automation. You will take ownership of the most complex threats facing CrowdStrike customers, architect scalable automation solutions, and serve as a technical mentor to researchers across all experience levels. Your work will directly influence the direction of threat research methodologies, tooling, and detection strategies that protect millions of endpoints worldwide.
About the team:
The CrowdStrike Malware Research Center is the core of Falcon's malware detection and response capabilities. The team has a focus on understanding the threat landscape and sets the target for what Falcon should be identifying and preventing. Additionally, the MRC is responsible for understanding our capabilities, and mapping how well our machine learning and behavioral protection capabilities are doing against those threats. Where there is a gap, the MRC takes action to improve our detection stance, and improve our overall protection story. MRC also performs pathfinding research to enable technology development using innovation, prototyping and bleeding edge machine learning to support our flagship Falcon product. There are many parts of CrowdStrike working towards protecting customer environments, and the MRC works across all of them to ensure we are on target and providing the best protection for our current Threat landscape.
Leading the charge for understanding the activity of malware today is the Threat Research team. With a focus on malware research, the primary role of the team is to understand relevant threats and techniques used in malware that are threatening our customer's business. The challenge is the enormous scale of malware today and sheer number of samples required to be addressed. This takes a more creative approach than traditional Anti-Virus research, focusing on one sample at a time. The modern threat lab requires an economy of scale through automation and machine learning to allow people to focus on new learnings, and let systems continue to identify malware based on what the team has learned.
What You'll Do:
Take ownership of critical technical initiatives and architect scalable automation solutions for malware analysis at scale
Serve as a technical mentor to researchers across all experience levels, helping to elevate team capabilities through knowledge sharing and technical guidance
Work independently on the most challenging and complex threats, performing deep reverse engineering and analysis
Collaborate cross-functionally with Engineering, Product, and Detection teams to translate research findings into production capabilities
Design proof-of-concept automation solutions and effectively hand off to engineering teams for production implementation
Directly influence the direction of threat research methodologies, tooling, and detection strategies across the organization
Drive technical excellence and thought leadership within the team, setting standards for analysis quality and automation practices
Build and optimize scalable automation pipelines, including integration with sandbox environments, YARA rule generation, and threat intelligence platforms
Produce high-quality technical documentation and reports that effectively communicate complex technical concepts to diverse audiences
What You'll Need:
Bachelor's or Master's degree in Computer Science or comparable field
12+ years of experience in the threat research field with a focus on malware analysis and reverse engineering
Strong reverse engineering skills on file-based threats, with demonstrated ability to deliver high-quality, in-depth analysis
Solid proficiency in disassembly and deep understanding of structured programming, compiler behaviors, and binary analysis techniques. Experience with reverse engineering tools such as IDA Pro, Ghidra, Binary Ninja, x64Dbg, or similar platforms
Experience in using machine learning and artificial intelligence for static and dynamic threat detection, including understanding of ML pipelines and model deployment in production environments
Strong understanding of file formats for compiled code and scripted files, with ability to analyze and contribute to parsers and feature extraction tools
Proficiency in multiple programming languages such as Python, Go, Rust, C++, or similar, with demonstrated ability to build production-quality automation tools and systems
Deep familiarity with multiple major Operating Systems (Windows, Linux, Mac), with in-depth knowledge of OS internals, kernel behaviors, and how host systems function at a technical level
Experience working with large data sets using tools like Splunk, ElasticSearch-Kibana, or similar platforms, along with knowledge of relational (MySQL, PostgreSQL) and non-relational/NoSQL databases (MongoDB, Cassandra, ElasticSearch)
Experience in building scalable automation pipelines for malware analysis, including integration with sandbox environments, YARA rule generation, and threat intelligence platforms
Deep working knowledge of malware-based automation workflows and techniques, with demonstrated ability to architect end-to-end automation solutions
Strong understanding of MITRE ATT&CK framework to describe and categorize threat behaviors
Strong technical communication and writing skills with ability to articulate complex technical concepts clearly and concisely to both technical and non-technical audiences
Track record of mentoring and providing technical guidance to researchers at all levels
Ability to influence technical direction and research strategy through deep expertise and thought leadership
Bonus Points:
Experience leveraging Generative AI and Large Language Models for threat research automation workflows, including malware analysis, report generation, and threat intelligence synthesis
Proven ability to design and implement AI-powered automation solutions that enhance team productivity and scale threat research capabilities
Understanding of prompt engineering, AI model integration, and the application of GenAI tools in cybersecurity contexts
Proficiency in data visualization and statistical analysis techniques for threat intelligence and research insights
Additional reverse engineering expertise around file-less threats, exploits, rootkits, and advanced attack techniques
Experience working with certification partners like AV-Test, AV-Comparatives, SE Labs
LI-VJ1
LI-Remote
Benefits of Working at CrowdStrike:
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Great Place to Work Certified™ across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.
Top Skills
CrowdStrike Pune, Mahārāshtra, IND Office
Pune, India

