Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

CrowdStrike, Inc. Sr. Security Researcher - Targeted Intrusions (Remote) in Kirkland, Washington

CrowdStrike, Inc. Full time R18091

#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We're looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.

About the Role:

CrowdStrike Intelligence is seeking a motivated malware reverse engineer with excellent technical skills to research nation state adversary operations used in targeted intrusions. Our Technical Analysis Cell (TAC) is at the forefront of CrowdStrike's mission against state-sponsored adversaries and criminal actors. We combine intelligence analysis with deep-dive reverse engineering and malicious code analysis, in addition to building and using automation systems to deliver actionable indicators and operational insights. CrowdStrike is uniquely positioned to leverage data from a multitude of sources, including our proprietary telemetry, our large internal malware corpus, and our custom-built analysis pipeline. We foster a diverse environment of respectful, passionate camaraderie and collaboration between researchers who enjoy the fast-paced nature of our work.

This highly technical position serves an important role in conducting research, increasing our coverage of the global threat landscape, contributing to the continuous tracking of targeted intrusion and nation state adversaries, and ultimately developing finished intelligence products that provide a decision advantage to customers.

We are ideally looking for a seasoned specialist in targeted intrusions and tracking of nation state adversaries. That said, we are also open to applications by experienced and talented malware researchers or reverse engineers without significant knowledge in this field who are willing to rapidly expand their skills to successfully carry out the following duties:

What You'll Do:

Technical Analysis:

  • Discover, investigate and track advanced cyber intrusions and document findings.

  • Enhance understanding of tools and malware through reverse engineering.

  • Develop tools to automate analysis tasks and tracking of threat actors.

  • Create host-based and network-based signatures suited for large-scale hunting, detection, and tracking of threats.

Intelligence Reporting:

  • Produce high-quality, actionable intelligence reporting.

  • Collaborate with our interdisciplinary team to coordinate adversary and campaign tracking,

    and to provide support to teams developing mitigation strategies and responding to incidents.

What You'll Need:

Required:

Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc).

Understanding of Windows OS internals.

Knowledge of programming and scripting languages, in particular Python.

Ability to identify and classify malicious tooling through development of signatures that can be used for tracking and hunting purposes.

Ability to express complex technical and non-technical concepts in written, verbal and graphical produc

DirectEmployers