Software Engineer (Remote)

CrowdStrike
11 months ago
Applications closed

Related Jobs

View all jobs

Software Engineer

Software Engineers (C++)

Lead Software Engineer

Senior Software Engineer

Logistics Software Engineer

Embedded Software Engineer

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

The collection, processing, and exploration of information at a large scale is at the core of the Intelligence mission at CrowdStrike. The Intelligence Automation team is responsible for prototyping, building and operating the systems that make up our Intelligence pipeline, and we'd like you to join us!

You will use languages such as Go and Python to build flexible data integration and processing systems in a fast-paced Intelligence environment. In this environment, requirements sometimes shift rapidly, and projects can live anything from weeks to years depending on changes in the surrounding ecosystem. You will be responsible for all aspects of the software you design, from documentation to deployment to production, and will interact regularly with your internal customers to gather requirements, solicit feedback and validate your results. We are agnostic when it comes to technology stacks, and you will be free to pick the technologies that best fit the requirements at any given time, based on your previous exposure to a wide variety of programming languages and databases.

As a remote employee on a team distributed across various time zones, you will not have direct access to all of your co-workers for the entire workday, so the ability to work unsupervised, communicate asynchronously, and take the initiative in maintaining lines of communication is important. In addition, we are looking for someone who would like to be part of a team who are passionate about their work and go the extra mile to exceed expectations. We love enthusiastic individuals who bring a positive attitude to their work and really care about what they produce for our internal customers.

What You'll Do:

  • Responsible for extracting and ingesting data from websites using web crawling tools, documented APIs and RSS feeds
  • Own the creation process of tools, services, and workflows to improve data ingestion
  • Own the process to identify and rectify any issues with breaks as well as scale scrapes as needed
  • Integrate into the existing Intelligence team and take requirements from Intelligence Analysts and Technical Analysts as internal customers
  • Develop requirements based on anything from vague mission statements to very detailed technical specifications
  • Implement system software components, making choices about implementation details, as well as the right balance between rapid development, scalability, and performance



What You'll Need:

  • Bachelor's degree in Computer Science or equivalent academic/work experience
  • Intimate familiarity with Linux and running services on Linux
  • Familiarity with docker and container orchestration systems
  • Familiarity with HTTP, HTML, and web design (CSS, DOM)
  • Demonstrable knowledge of Python and/or golang programming languages
  • Familiarity with techniques and tools for crawling, extracting and processing data (e.g. Scrapy, pandas, mapreduce, SQL, BeautifulSoup) as well as HTTP APIs or RSS feeds
  • Finding innovative ways to get data from various sources
  • Ability to communicate technical detail in a simple, top-down manner
  • Ability to independently make sound, justifiable decisions and take action
  • Ability to plan, organize and prioritize work independently and meet deadlines
  • Ability to work on a geographically distributed and diverse team



Bonus Points:

  • Knowledge or interest for AI powered tools to automate extraction of data from websites
  • Knowledge of Go programming language
  • Familiarity with social media APIs
  • Familiarity with the AWS and/or GCP cloud ecosystem (e.g. EC2, S3, VPC, ECS, AWS Glue)
  • Experience with data modeling, standardization, and normalization across a variety of structured/unstructured data formats
  • Experience offering scalable and well-documented HTTP APIs for customers
  • Experience from Information Security Capture-the-Flag (CTF) competitions or comparable offensive information security experience



#LI-EV1

#LI-JP2

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe



CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.