Jobs
My ads
My job alerts
Sign in
Find a job Employers
Find

Incident response analyst lead (remote, ire)

Dublin
CrowdStrike
Analyst
€60,000 - €80,000 a year
Posted: 28 August
Offer description

Incident Response Analyst Lead (Remote, IRE)


Incident Response Analyst Lead (Remote, IRE)

2 days ago Be among the first 25 applicants

Get AI-powered advice on this job and more exclusive features.

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About The Role

CrowdStrike is looking for a highly motivated, self-driven Incident Response Analyst to support specialized initiatives within the incident-response lifecycle—serving as a core member of TIER, a team within CSIRT focused on escalations, training, research, and strategic projects.

In this role, you’ll design and run training exercises, lead high-impact initiatives from leadership, take ownership of escalations, and conduct in-depth technical research to strengthen our ability to detect, investigate, and respond to threats across the organization. You’ll work shoulder-to-shoulder with seasoned Incident Responders to drive continuous improvement across our world-class security team.


* Do you find yourself interested in putting your hands-on technical skills to the test in investigating and resolving escalated incidents?
* Are you self-motivated and looking for an opportunity to broaden your expertise through research, training, and operational initiatives?
* Are you ready to dive into logs, endpoint telemetry, and threat intelligence to uncover the scope and cause of an event?
* Do you enjoy working around like-minded security professionals in a world class team who you can both learn from and mentor on a daily basis?
* Are you looking for a role where your contributions to training, research, and process design directly strengthen future investigations?
* Do you enjoy collaborating with a diverse, high-performing team and explaining technical risk to stakeholders who depend on your insights?

What You’ll Do

* Develop and deliver scenario-based training exercises for CSIRT to strengthen investigative skills and readiness.
* Take ownership of projects assigned by CSIRT leadership, implementing improvements that enhance workflows, tools, and response effectiveness.
* Manage escalated incidents by gathering and analyzing evidence from logs, endpoint telemetry, and threat-intel sources; perform and adapt investigative or containment actions from playbooks—such as host isolation, phishing email removal —and confirm remediation.
* Conduct in-depth research on topics that support team operations and improve investigative capabilities.
* Maintain clear documentation of investigative steps, evidence, decisions, and project progress to support transparency and knowledge sharing.
* Identify gaps in detection coverage, workflows, or tooling, and collaborate on new detection logic, playbook refinements, and automation opportunities.
* Contribute to the creation and maintenance of runbooks, knowledge articles, and other deliverables that strengthen CSIRT’s incident response capabilities.

What You’ll Need

* Demonstrated experience leading incident investigations from escalation through resolution, leveraging multiple data sources and coordinating with cross-functional teams.
* Proficiency with EDR platforms (e.g., Falcon), SIEM/SOAR technologies, and network forensics tools (e.g., Zeek, Suricata, Wireshark) to support deep investigations.
* Advanced investigative skills, including host- and network-level log analysis, endpoint telemetry review, and use of threat intelligence to determine scope and impact.
* Strong knowledge of Windows, macOS, and Linux internals, as well as digital forensics techniques for memory, disk, and network artifact analysis.
* Ability to perform basic to intermediate malware analysis, both static and dynamic, to extract indicators, understand behavior, and inform investigative or detection strategies.
* Proven ability to conduct in-depth research on topics that support team operations and improve investigative capabilities, and to translate findings into actionable outcomes.
* Solid understanding of network protocols (HTTP/S, DNS, SMTP, SMB, Kerberos) and the ability to analyze packet captures.
* Strong written and verbal communication skills, with the ability to present investigative findings and recommendations to both technical and non-technical stakeholders.
* Experience conducting cloud-focused incident response in AWS, Azure, or GCP environments.
* Ability to design and deliver scenario-based training to enhance investigative skills and operational readiness.

Bonus Points

* Advanced scripting or development experience (Python, PowerShell, Bash, or Perl) to create custom investigative tooling, automate complex data analysis, or integrate new data sources into investigative workflows.
* Expertise as a SIEM power user, capable of executing advanced, investigation-driven searches, building specialized dashboards, and developing or refining high-fidelity detections.
* Experience performing malware reverse engineering to extract indicators, analyze functionality, and produce tailored detection or mitigation strategies.
* Proven track record of publishing threat research, presenting at security conferences, or contributing to industry-wide knowledge sharing.

Education

* A bachelor’s or master’s degree in Computer Science, Cybersecurity, Digital Forensics, or a related field is welcome — but not required. Candidates who can demonstrate equivalent, hands-on experience in incident response, threat research, or digital forensics will receive full consideration.
* Applicable security certifications (e.g., GCFA, GREM, GNFA, GCTI).

Benefits Of Working At CrowdStrike

* Remote-friendly and flexible work culture
* Market leader in compensation and equity awards
* Comprehensive physical and mental wellness programs
* Competitive vacation and holidays for recharge
* Paid parental and adoption leaves
* Professional development opportunities for all employees regardless of level or role
* Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
* Vibrant office culture with world class amenities
* Great Place to Work Certified across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.



Seniority level

* Seniority level

Mid-Senior level


Employment type

* Employment type

Full-time


Job function

* Job function

Management and Manufacturing
* Industries

Computer and Network Security

Referrals increase your chances of interviewing at CrowdStrike by 2x

Get notified about new Incident Analyst jobs in Dublin, County Dublin, Ireland.

Dublin, County Dublin, Ireland 1 week ago

Dublin, County Dublin, Ireland 1 week ago

Dublin, County Dublin, Ireland 43 minutes ago

Dublin, County Dublin, Ireland 1 week ago


Director Gartner Analyst, Identify and Access Management, Remote Europe or Remote Canada

Dublin, County Dublin, Ireland 6 days ago

Dublin, County Dublin, Ireland 1 week ago

Dublin, County Dublin, Ireland 4 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr

Apply
Create an E-mail Alert
Job alert activated
Saved
Save
Similar job
Gcc analyst
Dublin
Digital Realty
Analyst
€40,000 - €60,000 a year
Similar job
Senior regulation analyst 18 months ftc
Dublin
ESB
Analyst
Similar job
Fundamental analyst
Dublin
Infosys BPM
Analyst
€40,000 - €80,000 a year
Similar jobs
Service jobs in Dublin
jobs Dublin
jobs County Dublin
jobs Leinster
Home > Jobs > Service jobs > Analyst jobs > Analyst jobs in Dublin > Incident Response Analyst Lead (Remote, IRE)

About Jobijoba

  • Company Reviews

Search for jobs

  • Jobs by Job Title
  • Jobs by Industry
  • Jobs by Company
  • Jobs by Location

Contact / Partnership

  • Contact
  • Publish your job offers on Jobijoba

Legal notice - Terms of Service - Privacy Policy - Manage my cookies - Accessibility: Not compliant

© 2025 Jobijoba - All Rights Reserved

Apply
Create an E-mail Alert
Job alert activated
Saved
Save