Cloud Threat Hunting Principal Consultant (Remote) at CrowdStrike, Inc. – Sunnyvale, California
Explore Related Opportunities
About This Position
Full time
R28193
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
About the Role:
CrowdStrike is looking for a highly motivated, self-driven, cloud threat hunter dedicated to making a difference in global security by protecting organizations against the most advanced adversaries in the world. Our CrowdStrike Professional Services team offers opportunities to expand your skill set through a wide variety of impactful consulting engagements for many of the world's leading organizations.
The Cloud Threat Hunting Principal Consultant will be responsible for conducting compromise assessments in cloud environments to identify active and historical threats, reviewing cloud control plane configurations, and providing actionable recommendations to enhance the security posture of customer cloud environments.
What You’ll Do:
Drive hunting methodology improvements, including maturing existing capabilities, developing new service features, and cross-functional collaboration with product, IR, and data science.
Develop queries, scripts, AI prompts, and dashboards to automate the hunting for and analysis of deterministic behaviors and IOAs.
Build agentic workflows using orchestration frameworks to augment and automate data analysis and reporting tasks.
Leverage analytics and threat intelligence to analyze cloud logs and control plane configurations to identify historical and active threats.
Manage complex client complex engagements, lead internal teams, and provide regular status updates to clients regarding project status and findings.
Produce high-quality written and verbal reports, presentations, recommendations, and findings to key stakeholders including customer management, regulators, and legal counsel.
Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events.
What You’ll Need:
Successful candidates will have experience in one or more of the following areas:
A strong understanding of one or more of the following cloud platforms: AWS, Azure, or GCP, including identity, architecture, security, and logging.
An understanding of Agentic AI and at least one orchestration framework.
Strong analytical skills, attention to details, and ability to work with large data sets up to terabytes in size.
At least 5 years of hands-on threat hunting experience in cloud and/or on-premises environments.
Excellent communication skills, including a strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams.
Additionally, background in at least one of the following domains is required:
Threat Hunting: experience conducting, developing, or managing adversary threat hunting engagements, in either an internal security or consulting environment.
Incident Response: experience conducting incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat (APT), Organized Crime, and Hacktivists.
Threat Research: analyzing cloud threats, tracking attack campaigns, conducting vulnerability research, and developing attack techniques.
Detection Engineering: creating and implementing detection logic in tools, testing detection against known threats, and managing detection content lifecycle.
Education & Certifications:
BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Applicants without a degree but with relevant work experience and/or training will be considered.
Holders of a CISSP, CISA, CISM, CCSP, or any practitioner or security certifications in AWS, Azure and GCP may be considered in lieu of or in addition to a degree.
#LI-AC1
#LI-Remote
This role may require the candidate to periodically undergo and pass alcohol and/or drug test(s) during the course of employment.Benefits of Working at CrowdStrike:
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Great Place to Work Certified™ across the globe
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.
CrowdStrike participates in the E-Verify program.
Notice of E-Verify Participation
Right to Work
CrowdStrike, Inc. is committed to fair and equitable compensation practices. Placement within the pay range is dependent on a variety of factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. The base salary range for this position for all U.S. candidates is $140,000 - $195,000 per year, with eligibility for bonuses, equity grants and a comprehensive benefits package that includes health insurance, 401k and paid time off.For detailed information about the U.S. benefits package, please click here.
Expected Close Date of Job Posting is:06-09-2026