Sr. Software Engineer, SDET - Windows Detections Platform Team (Remote)

CrowdStrike
1 year ago
Applications closed

Related Jobs

View all jobs

E&I Project Engineer

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. We work on large scale distributed systems, processing almost 3 trillion events per day. We have 3.44 PB of RAM deployed across our fleet of C* servers - and this traffic is growing daily. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

We are seeking a Sr. Software Engineer, SDET - Windows. You'll join our Windows Sensor Team as part of our Detections Platform Group, which focuses on building common frameworks to leverage the power of our endpoint agent to effectively and quickly deliver actionable insights to customers and other teams within Crowdstrike. The Detections Platform team is central to CrowdStrike's mission - "We Stop Breaches." Our goals are to improve visibility, accelerate detections, and move faster than our adversaries.

On our team, a Software Development Engineer in Test (SDET) is a software engineer who focuses on the tools and methods used to ensure that our systems behave in the intended ways. This work ranges from formal modeling to verifying designs to building frameworks that make it easier for other developers to write unit tests. The code is not a black box - if it needs to change to be testable, you can and should change it.

More specifically, you'll be part of the engineering team enhancing our endpoint sensor for Windows. This team builds frameworks which interact with the file system, operating system, and registry to surface interesting events for analysis by the detections engine. This team owns the file system minifilter and writes both kernel- and user-mode code.

CrowdStrike is a remote-friendly organization, and you'll be collaborating with developers in many locations. Remote applicants in Ireland are welcome. Occasional travel (<10>

CrowdStrike is a computer security company, but we do not expect candidates for this role to have prior security industry experience. We will mentor and train in security topics as needed. We expect a strong interest in CrowdStrike's mission and a willingness to grow into a position consulting on system design decisions and coordinating with other teams across the company.

We want to talk if you have some but not all of the qualifications but bring a passion for cybersecurity.

What You'll Do:

  • Develop test frameworks and test automation for developer use.
  • Design and write larger-scale integration and end-to-end tests.
  • Automate test processes for speed, reproducibility, and scalability. You will build unit tests, system tests, performance tests and more.
  • Understand the requirements of software projects and build test plans appropriate to those requirements.
  • Participate in reproducing and diagnosing customer support issues
  • Participate in end-to-end component design.
  • Write the tests that other engineers don't naturally own, like app compatibility.
  • Collaborate with multidisciplinary CrowdStrikers to improve our release validation process.
  • Identify needed test cases and coach developers on test development and coverage.
  • Evaluate features for risk, interior and exterior impact, and how we establish confidence.
  • Write clear and detailed bug reports when things break, and work with the team to identify and validate fixes.
  • Deliver and accept feedback with grace and courtesy.



What You'll Need:

  • Advanced literacy with Windows Kernel and/or Userspace systems, including experience with user and kernel debuggers (such as Windbg on Windows) and the ability to diagnose a bug from a user or kernel crash dump.
  • Strong programming experience and capability in C or C++ supporting Windows kernel development or other low-level systems software.
  • Strong general knowledge of low-level operating system internals, components, APIs, and design, for one or more of our supported platforms (including Windows, macOS, and Linux).
  • 8+ years of 'combined' experience in any Software Developer role.
  • 3+ years' experience in a testing-oriented engineering position
  • Demonstrated experience with CI/CD frameworks.
  • Find bugs just as interesting as features; you like breaking software as much as building it.
  • Effective communication and collaboration to work well with a globally distributed team.
  • Understanding of fundamental computer science concepts like compilation or thread contention.
  • Experience in the analysis and implementation of data structures, algorithms, and software design.
  • Experience testing databases, operating system services, or microservice architectures.
  • Experience building and using build pipelines, continuous integration, and test automation.
  • Passion for learning and championing the newest technologies & tricks with others to raise the technical IQ of the team.



Bonus Points:

  • Prior experience with pytest, Jenkins, or Bitbucket in a SAAS environment.
  • Prior experience working with low-level code, or Windows kernel development.
  • Knowledge of low-level operating system internals, components, APIs, and design, for one or more of our supported platforms (including Windows, macOS, and Linux).
  • Ability to read C++ code with a focus on robustness and security (or lack thereof).
  • Experience using performance profiling tools such as WPA, ETW, and Xperf for Windows.
  • Familiarity with embedded databases (LSM, RocksDB).
  • Familiarity with data modeling, design, and self-describing formats (like JSON).
  • Experience working with programming language tools or broadly distributed systems.
  • Experience with event processing systems.
  • Ability to improve developer experiences and workflows through automation, tooling, and testability.



#LI-Remote

#LI-SC2

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture
  • Market leader in compensation and equity awards
  • Comprehensive physical and mental wellness programs
  • Competitive vacation and holidays for recharge
  • Paid parental and adoption leaves
  • Professional development opportunities for all employees regardless of level or role
  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections
  • Vibrant office culture with world class amenities
  • Great Place to Work Certified™ across the globe



CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at for further assistance.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.