The Junior CrowdStrike Analyst / Administrator will be responsible for the day-to-day administration, troubleshooting, and optimization of the company’s CrowdStrike Falcon environment. This position plays a key role in ensuring endpoint protection coverage, maintaining platform health, and assisting in the analysis of detections and vulnerabilities. The ideal candidate combines strong technical troubleshooting skills with a foundational understanding of endpoint security and automation.
Key Responsibilities:
Administer and maintain the company’s CrowdStrike Falcon platform across Windows, macOS, and Linux environments.
Troubleshoot sensor installation, registration, and communication issues with end-user systems.
Manage, review, and optimize CrowdStrike policies to ensure effective protection while minimizing operational impact.
Monitor and maintain overall Falcon sensor health, ensuring full visibility across all managed assets.
Collaborate with IT, Security Operations, and product Infrastructure teams to resolve issues affecting endpoint protection.
Investigate and validate CrowdStrike alerts, detections, and potential false positives.
Document configurations, change history, troubleshooting steps, and standard operating procedures.
Develop and maintain automation scripts and tools (Python preferred) to streamline administrative tasks and reporting.
Support integration of CrowdStrike Falcon with SIEM, SOAR, and asset management platforms.
Leverage Terraform or similar infrastructure-as-code tools to manage and maintain configuration consistency.
Assist in vulnerability and threat analysis initiatives as part of the broader cybersecurity program.
Requirements
1–3 years of experience administering or supporting the CrowdStrike Falcon platform or a comparable EDR solution.
Solid understanding of endpoint protection principles and security event analysis.
Strong troubleshooting skills related to endpoint agents, operating systems, and network communications.
Working knowledge of the CrowdStrike management console, including policy tuning and host management.
Familiarity with Windows, MacOS, and Linux administration and operation principles
Excellent written and verbal communication skills with a focus on clear documentation and collaboration.
Preferred Qualifications:
Experience developing scripts or tools using Python for automation and data analysis.
Exposure to Terraform or other infrastructure-as-code frameworks.
Experience leveraging Data Bricks for data analysis and dashboard generation.
Familiarity with SIEM or SOAR integrations and API-driven workflows.
Understanding of MITRE ATT&CK framework and its application to EDR detections.
Experience participating in endpoint vulnerability management or remediation initiatives.
Ideal Candidate Traits:
Detail-oriented with a proactive and analytical mindset.
Comfortable troubleshooting complex systems and collaborating across departments with written and virtual/in person interactions.
Eager to learn, automate, and continuously improve existing security processes.
Thrives in a fast-moving environment and takes ownership of outcomes.
Extreme ownership of tasks and problems, with the ability to manage up to drive results.
What Success Looks Like:
Healthy, up-to-date CrowdStrike sensors with consistent endpoint coverage.
Well-tuned policies that balance security effectiveness with usability.
Efficient troubleshooting and automation that reduces manual workload.
Actionable security insights extracted from the tool findings along with recommendations for resolving and preventing future issues.