Full-Time

Sr. Engineer

C++/Linux Sensor

Confirmed live in the last 24 hours

Crowdstrike

Crowdstrike

5,001-10,000 employees

Cloud-native endpoint security solutions provider

Enterprise Software
Cybersecurity

Compensation Overview

$135k - $215kAnnually

+ Variable Compensation + Incentive Compensation + Equity

Senior

Company Historically Provides H1B Sponsorship

Remote in USA + 1 more

More locations: Remote in Canada

Remote-friendly and flexible work culture.

Category
Embedded Engineering
Security Engineering
Software Engineering
Required Skills
C/C++
Linux/Unix

You match the following Crowdstrike's candidate preferences

Employers are more likely to interview you if you match these preferences:

Degree
Experience
Requirements
  • Can develop high-quality code in C++ for Linux and can demonstrate that capability, be it through job experience or contributions to community projects.
  • Experience working on a team to ship major features and releases.
  • Able to communicate, collaborate, and work effectively in a distributed team.
  • Understanding of networking fundamentals.
  • Mac and Linux OS development experience is plus.
  • Experience building cyber security related products is a plus.
  • Experience on developing product code with the following characteristics: High concurrency requirements needing strong use of multi-threading and high reliability requirements.
Responsibilities
  • Lead Engineering efforts and work along with the Product Management where applicable helping define the scope of work.
  • Demonstrate ownership, accountability and collaborate with cross-functional teams across Product Groups that are geographically distributed.
  • Design and develop user mode software for deployment on Windows systems.
  • Own features from design to delivery.
  • Collaborate with multi-functional team in various physical locations.
  • Troubleshoot issues with the product as reported from customers responsively.
  • Develop software for Products as assigned (Falcon For IT, and more).
Desired Qualifications
  • Mac and Linux OS development experience is plus.
  • Experience building cyber security related products is a plus.

CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity industry, known for its effectiveness in threat detection and response.

Company Size

5,001-10,000

Company Stage

IPO

Total Funding

$468M

Headquarters

Austin, Texas

Founded

2011

Simplify Jobs

Simplify's Take

What believers are saying

  • Integration with Superna enhances Falcon platform's ransomware defense and data protection.
  • Charlotte AI Detection Triage automates alert assessment, reducing manual triage by 40 hours weekly.
  • Addressing high-severity vulnerabilities demonstrates CrowdStrike's commitment to security and customer trust.

What critics are saying

  • AI-powered threats like generative AI-driven phishing challenge real-time detection capabilities.
  • 60% of intrusions involve valid credentials, threatening identity protection solutions.
  • New ransomware groups like RansomHub increase risks for clients in targeted industries.

What makes Crowdstrike unique

  • CrowdStrike's Falcon platform integrates threat intelligence with next-gen antivirus and EDR.
  • The company serves 44 of the Fortune 100, showcasing its strong market presence.
  • CrowdStrike offers proactive threat hunting, enhancing its cybersecurity service offerings.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Competitive Employee Stock Purchase Plan

Remote-friendly culture

Market leader in compensation and equity awards

Competitive vacation and flexible working arrangements

Comprehensive health benefits + 401k plan

Paid Parental Leave, including adoption

Wellness programs

Professional development and mentorship opportunities

Open offices have stocked kitchens, coffee, soda and treats

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

0%

2 year growth

-1%
VentureBeat
Feb 20th, 2025
Identity Is The Breaking Point — Get It Right Or Zero Trust Fails

This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.Deepfakes, or AI-driven deception and weaponized large language models (LLMs) aren’t just cyber threats; they’re the new weapons of mass exploitation. Adversaries aren’t just hacking systems anymore; they’re hacking people and their identities.Impersonating executives, bypassing security with stolen credentials and manipulating trust at scale are all redefining the new threatscape. It’s an all-out cyberwar with identities hanging in the balance. AI and generative AI are giving adversaries an edge in how quickly they can fine-tune and improve their tradecraft.The result: Massive breaches and ransomware demands that are setting new records and fueling double extortion demands.CrowdStrike’s 2024 Global Threat Report highlights this concern, revealing that 60% of intrusions now involve valid credentials, revealing the growing threat of identity-based attacks. Jeetu Patel, Cisco’s EVP and CPO, describes the fundamental problem enterprises face: “The attacks are getting very coordinated, but the defenses are very isolated. That dissonance is not a healthy distance to have.”Shlomo Kramer, cofounder and CEO of Cato Networks, echoed that view: “The era of cobbled-together security solutions is over.” Cato’s rapid growth underscores how businesses are moving to unified, cloud-based security to eliminate these gaps.Adversaries ranging from rogue attackers to nation-state cyberwar units are prioritizing the exfiltration of identities at scale and profiting from them for financial and political gain (sometimes both).It’s on security leaders and their teams to shift their security postures to adapt and stop identity-driven attacks, beginning with continuous authentication, least privilege access and real-time threat detection

VentureBeat
Feb 20th, 2025
Ai Vs. Endpoint Attacks: What Security Leaders Must Know To Stay Ahead

This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.Enterprises run the very real risk of losing the AI arms race to adversaries who weaponize large language models (LLMs) and create fraudulent bots to automate attacks.Trading on the trust of legitimate tools, adversaries are using generative AI to create malware that doesn’t create a unique signature but instead relies on fileless execution, making the attacks often undetectable. Gen AI is extensively being used to create large-scale automated phishing campaigns and automate social engineering, with attackers looking to exploit human vulnerabilities at scale.Gartner points out in its latest Magic Quadrant for Endpoint Protection Platforms that  “leaders in the endpoint protection market are prioritizing integrated security solutions that unify endpoint detection and response (EDR), extended detection and response (XDR) and identity protection into a single platform. This shift enables security teams to reduce complexity while improving threat visibility.”The result? A more complex threat landscape moving at machine speed while enterprise defenders rely on outdated tools and technologies designed for a different era.The scale of these attacks is staggering. Zscaler’s ThreatLabz indicated a nearly 60% year-over-year increase in global phishing attacks, and attributes this rise in part to the proliferation of gen AI-driven schemes. Likewise, Ivanti’s  2024 State of Cybersecurity Report found that 74% of businesses are already seeing the impact of AI-powered threats. And, nine in 10 executives said they believe that AI-powered threats are just getting started.“If you’ve got adversaries breaking out in two minutes, and it takes you a day to ingest data and another day to run a search, how can you possibly hope to keep up?” Elia Zaitsev, CTO of CrowdStrike noted in a recent interview with VentureBeat​.The new cyber arms race: Adversarial AI vs

AgFunder News
Feb 18th, 2025
Ransomware Attacks On Food And Ag Expected To Rise, Possible ‘Cascading Impacts’ On The Sector

Food and ag continues to be a target for ransomware attacks, according to a new report from threat intelligence agency the Food and Ag-ISAC (Information Sharing and Analysis Centers).“Farm-to-Table Ransomware Realities” examines ransomware attacks on the sector, which increased in 2024 and are predicted to rise further as threat actors target vulnerabilities in the supply chain. Last year, food and ag saw 212 ransomware attacks, up 27% from 167 in 2023.More than half of all attacks on food and ag are ransomware, says the Food and Ag-ISAC, which partners with the IT-ISAC to monitor ransomware incidents, Ransomware in food and agriculture now accounts for 5.5% of total ransomware attacks across industries. Of the 11 sectors monitored by ISAC, food and ag ranked sixth for ransomware attack volume.‘Cascading impacts’ on the whole sectorRansomware attacks put the company as well as its suppliers and partners at risk, notes the report, and a single disruption can have “cascading impacts” on the whole industry.As an example, the report highlights ransomware attacks impacting agricultural production lines:“Any downtime caused by an attack could lead to a chain reaction of delays, potentially causing late planting or harvesting windows. As a result, crops may need to be palletized and moved to other regions during an active growing season. This is already done in cases of severe weather, such as droughts or flooding, but it is an expensive and taxing process that strains limited resources.”The report also highlights the additional stressor of health and human safety being at risk when food and ag production are put at risk.Intellectual property — particularly where genetics are concerned — is also at risk, although the Food and Ag-ISAC notes that at this point, financial gain is the primary motivation for attacks on the sector.Who is making the attacks?RansomHub — a comparatively young ransomware group, having emerged in 2024 — carried out the most attacks on the food and ag sector last year.The group uses the “ransomware-as-a-service” model, where an operator recruits affiliates who pay to use the ransomware service. LockBit (see below) was previously the world’s most active RaaS group; law enforcement officials from 10 different countries disrupted the operation in 2024

PR Newswire
Feb 13th, 2025
Superna Announces New Integrations With Crowdstrike Falcon Next-Gen Siem To Bolster Ransomware Defense

MARLBOROUGH, Mass., Feb. 12, 2025 /PRNewswire/ -- Superna today announced a new partnership with CrowdStrike to integrate Superna's Data Security Edition with the industry-leading CrowdStrike Falcon® cybersecurity platform. Leveraging Falcon® Next-Gen SIEM , this integration drives SOC transformation and delivers real-time data protection, keeping businesses operational with file-level rollback from immutable snapshots.The speed and sophistication of cyber attacks continues to increase, with breakout times now measured in minutes. The Superna and CrowdStrike integration prevents advanced threats targeting critical data, accelerates detection and response, and streamlines security operations. Customers gain enhanced ransomware defense with the ability to detect storage anomalies early, prevent unauthorized access through automated user lockouts, and recover quickly with snapshots and file-level restoration. Additionally, fast host containment helps ensure compromised devices are quickly isolated, streamlining incident response within Falcon Next-Gen SIEM.Falcon Next-Gen SIEM integrates both native and third-party data, threat intelligence and AI-driven automation to stop breaches with speed and efficiency

Benzinga
Feb 13th, 2025
CrowdStrike Stock Is Hitting New Highs Thursday: What's Going On?

What Happened: CrowdStrike announced a breakthrough in agentic AI-driven security with the release of Charlotte AI Detection Triage.