Sr. Security Researcher, TAC Cloud

Germany
Yesterday
£50,000 – £100,000 pa

Salary

£50,000 – £100,000 pa

Job Type
Permanent
Work Pattern
Full-time
Work Location
Remote
Seniority
Senior
Education
Degree
Security Clearance
Required
Posted
7 May 2026 (Yesterday)

Benefits

Flexible Working Collaborative Environment Professional Development

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:
CrowdStrike Intelligence is seeking a motivated cloud security specialist with excellent technical skills to research the activities of cloud-conscious adversaries. Our Technical Analysis Cell (TAC) is at the forefront of CrowdStrike’s mission against cloud-conscious threat actors. We often are the first to catch adversaries leverage never-before observed techniques in the cloud. We combine intelligence analysis with deep-dive cloud service provider log analysis (AWS CloudTrail, Azure Activity Logs), and reverse engineering of malicious code, in addition to building and using automation systems to deliver actionable indicators and operational insights. CrowdStrike is uniquely positioned to leverage data from a multitude of sources, including incident response, managed threat hunting, proprietary telemetry, our large internal malware corpus, and our custom-built analysis pipeline. We foster a diverse environment of respectful, passionate camaraderie and collaboration between researchers who enjoy the fast-paced nature of our work.This highly technical position serves an important role in conducting research, increasing our coverage of the global cloud threat landscape, contributing to the continuous tracking of cloud adversaries, and ultimately developing finished intelligence products that provide a decision advantage to customers. These skills will be used to successfully carry out the following duties:


What You'll Do:
Technical Analysis:

  • Reconstruct, investigate, and track cloud intrusions leveraging cloud service provider activity logs (AWS CloudTrail, Azure Activity Logs) and document findings.

  • Enhance understanding of observed cloud activity by reproducing the activity in a test cloud environment.

  • Create tools to automate analysis tasks and tracking of threat actors.

  • Write cloud-activity-based (KQL, Amazon Athena), host-based (Yara) and network-based (Snort/Suricata) signatures suited for large-scale hunting, detection, and tracking of threats.

  • Perform a technical analysis and reverse engineering of tools related to threat activity within the cloud environment or as part of cloud-conscious intrusions

  • Intelligence Reporting:

  • Produce high-quality, actionable intelligence reporting.

  • Collaborate with our interdisciplinary team to coordinate adversary and campaign tracking, and to provide support to teams developing mitigation strategies and responding to incidents.


What You'll Need:
Required:

  • Understanding of cloud security concepts in particular identity and access management (IAM).

  • Ability to reconstruct incidents based on cloud activity logs from at least one major cloud service provider (AWS, Azure, or GCP)

  • Ability to express complex technical and non-technical concepts in written, verbal and graphical products for all levels of readership, including actionable mitigation and detection guidance.

  • Knowledge of programming and scripting languages, in particular Python.

  • Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc).

  • Ability to identify and classify malicious tooling through development of signatures that can be used for tracking and hunting purposes.

  • Ability to interpret raw network data and to develop network signatures, as well as custom protocol decoders and decryption tools.

  • Be a team player

Bonus Points:

  • Experience developing detections with KQL and Amazon Athena

  • Proven track record of relevant experience in the cloud security field

  • A background in intelligence is a plus.

  • Relevant cloud certifications are a plus.

#LI-EV1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.

Related Jobs

View all jobs

Sr. Security Researcher, TAC Cloud

CrowdStrike Germany
£50,000 – £100,000 pa Remote Clearance Required

Sr. Security Researcher, TAC TBNA

CrowdStrike Germany
Remote

Sr. Security Researcher II, Persona Ops

CrowdStrike Dunscore, Alba / Scotland, DG2 0SR, United Kingdom
Remote

Sr. Security Researcher II, Persona Ops

CrowdStrike Bigton, Alba / Scotland, ZE2 9GA, United Kingdom
£40,000 – £60,000 pa Remote

Sr. Security Researcher II, Persona Ops

CrowdStrike London, E10 6AP, United Kingdom
Remote

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Where to Advertise Cyber Security Jobs in the UK (2026 Guide)

Advertising cyber security jobs in the UK requires a different approach to most technical hiring. The candidate pool is small, heavily vetted and in high demand across government, financial services, critical national infrastructure and the private sector simultaneously. Many of the strongest candidates hold active security clearances, are not actively job-searching through general platforms, and move primarily through specialist networks and trusted referrals. General job boards reach a broad audience but lack the specificity that security professionals expect. Specialist platforms, government-affiliated channels and cleared candidate networks each serve a different part of the market. This guide, published by CybersecurityJobs.tech, covers where to advertise cyber security roles in the UK in 2026, how the main platforms compare, what employers should expect to pay, and what the data says about hiring across different role types.

Cyber Security Jobs UK 2026: What to Expect Over the Next 3 Years

Cyber security is one of the few sectors where demand for talent has never once dipped. Every major technological shift of the past decade — cloud migration, remote working, AI adoption, the proliferation of connected devices — has expanded the attack surface that security professionals are expected to defend. And every expansion of that attack surface has generated more jobs. But the cyber security jobs market of 2026 is not simply a larger version of what it was three years ago. It is a structurally different market. The threats have evolved, the technologies used to combat them have changed, the regulatory environment has tightened considerably, and the roles being created reflect all of that. A job seeker who understands only the cyber security landscape of 2023 is already working with an outdated map. The candidates who will thrive over the next three years are those who understand where the sector is heading — which specialisms are attracting the most investment, which technologies are reshaping defensive and offensive security practice, and how the definition of a cyber security professional is broadening well beyond the traditional image of a network defender in a SOC. This article breaks down what the UK cyber security jobs market is likely to look like through to 2028 — covering the titles emerging right now, the technologies driving employer demand, the skills that will matter most, and how to position your career ahead of the curve.

Penetration Tester Jobs in the UK: What Employers Actually Want in 2026

The demand for skilled professionals in cyber security has never been higher, and penetration testers sit at the very heart of this rapidly evolving industry. As organisations across the UK continue to digitise their operations, protect sensitive data, and defend against increasingly sophisticated threats, the need for ethical hackers has grown dramatically. If you are considering a career in this field—or looking to advance within it—it is essential to understand what employers are really looking for in 2026. This guide breaks down the current expectations, required skills, certifications, and practical experience that can help you stand out in a competitive job market.