Full-Time

Sr. Manager

Servicenow Development

Confirmed live in the last 24 hours

Crowdstrike

Crowdstrike

5,001-10,000 employees

Cloud-native endpoint security solutions provider

Enterprise Software
Cybersecurity

Compensation Overview

$135k - $225kAnnually

+ Variable Compensation + Equity

Senior, Expert

Company Historically Provides H1B Sponsorship

Remote in USA

Category
IT Project Management
System Administration
IT & Security
Required Skills
Agile
ServiceNow

You match the following Crowdstrike's candidate preferences

Employers are more likely to interview you if you match these preferences:

Degree
Experience
Requirements
  • Bachelor’s degree in the field of computer science, information systems, other related degree, or equivalent experience (typically 12-14 years working in IT Service Management and / or with the ServiceNow platform)
  • ITIL Certification - Minimum V3 Foundation
  • Demonstrable knowledge of the ITSM framework (ITIL)
  • Demonstrable knowledge of Agile ways of working and experience in measuring level of effort with enhancements, defects, and stories
  • Excellent written and spoken communication and interpersonal skills
  • 5+ years management experience leading high performing development teams
  • Demonstrated ability to influence executive leadership
  • A drive for automation, efficiency, and the streamlining of processes and workflows to reduce friction, and drive consistent experiences.
Responsibilities
  • Recruit, develop, mentor and manage a high performing team of ServiceNow developers
  • Foster a collaborative, results-oriented, and innovative work environment
  • Implement and maintain development standards and governance processes across the ServiceNow platform
  • Ensure the team adheres to these coding standards and best practices, in order to deliver high-quality, scalable, and maintainable solutions
  • Ensure that the platform complies with organizational security policies and regulatory requirements
  • Stay up to date with ServiceNow platform upgrades, new features, and best practices to continually evolve the platform’s capabilities
  • Manage demand intake for the team: planning, forecasting and managing team tasks and projects using Agile methodologies
  • Lead project planning, resource allocation, and timelines to ensure successful on-time delivery of projects
  • Build and deliver a technical debt remediation plan to deliver on the architecture and operating model strategy of the SMO
  • Monitor and manage the performance of the ServiceNow platform, identifying and resolving issues in a timely manner
  • Develop and execute team KPIs
  • Regularly communicate progress, challenges, and opportunities to key stakeholders, ensuring transparency and alignment
  • Working with the Director, and the Senior Manager, IT SMO: support the operating model for the SMO, via ServiceNow development and build out a three year roadmap for ITSM and ServiceNow
  • Other duties as assigned.
Desired Qualifications
  • ITIL V4 foundation or higher
  • Agile Certification - Agile Leader
  • Knowledge of CMDB and Common Service Data Model (CSDM) concepts
  • ServiceNow Development experience - particularly - proficiency in JavaScript, HTML/CSS, and other relevant programming languages
  • ServiceNow (or equivalent ITSM tool) platform experience - including good working understanding of the ITSM, Legal, HR, and Security modules
  • Business analysis skills to turn business requirements into technical scope / statement of work documentation for Development teams
  • ServiceNow Certified System Administrator (CSA)
  • ServiceNow Certified Application Developer (CAD)

CrowdStrike specializes in cybersecurity, focusing on protecting businesses from cyber threats through cloud-native endpoint security solutions. Their main product, the Falcon platform, includes services like Falcon Pro, which replaces traditional antivirus with next-generation antivirus that integrates threat intelligence, Falcon Insight for endpoint detection and response, and Falcon Device Control to manage connected devices. Unlike many competitors, CrowdStrike's services are subscription-based, allowing clients to choose different levels of protection based on their needs. The company serves a diverse clientele, including many Fortune 100 companies, and is recognized as a leader in the cybersecurity industry, known for its effectiveness in threat detection and response.

Company Size

5,001-10,000

Company Stage

IPO

Total Funding

$468M

Headquarters

Austin, Texas

Founded

2011

Simplify Jobs

Simplify's Take

What believers are saying

  • Integration with Superna enhances Falcon platform's ransomware defense and data protection.
  • Charlotte AI Detection Triage automates alert assessment, reducing manual triage by 40 hours weekly.
  • Addressing high-severity vulnerabilities demonstrates CrowdStrike's commitment to security and customer trust.

What critics are saying

  • AI-powered threats like generative AI-driven phishing challenge real-time detection capabilities.
  • 60% of intrusions involve valid credentials, threatening identity protection solutions.
  • New ransomware groups like RansomHub increase risks for clients in targeted industries.

What makes Crowdstrike unique

  • CrowdStrike's Falcon platform integrates threat intelligence with next-gen antivirus and EDR.
  • The company serves 44 of the Fortune 100, showcasing its strong market presence.
  • CrowdStrike offers proactive threat hunting, enhancing its cybersecurity service offerings.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Competitive Employee Stock Purchase Plan

Remote-friendly culture

Market leader in compensation and equity awards

Competitive vacation and flexible working arrangements

Comprehensive health benefits + 401k plan

Paid Parental Leave, including adoption

Wellness programs

Professional development and mentorship opportunities

Open offices have stocked kitchens, coffee, soda and treats

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

0%

2 year growth

-1%
VentureBeat
Feb 20th, 2025
Identity Is The Breaking Point — Get It Right Or Zero Trust Fails

This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.Deepfakes, or AI-driven deception and weaponized large language models (LLMs) aren’t just cyber threats; they’re the new weapons of mass exploitation. Adversaries aren’t just hacking systems anymore; they’re hacking people and their identities.Impersonating executives, bypassing security with stolen credentials and manipulating trust at scale are all redefining the new threatscape. It’s an all-out cyberwar with identities hanging in the balance. AI and generative AI are giving adversaries an edge in how quickly they can fine-tune and improve their tradecraft.The result: Massive breaches and ransomware demands that are setting new records and fueling double extortion demands.CrowdStrike’s 2024 Global Threat Report highlights this concern, revealing that 60% of intrusions now involve valid credentials, revealing the growing threat of identity-based attacks. Jeetu Patel, Cisco’s EVP and CPO, describes the fundamental problem enterprises face: “The attacks are getting very coordinated, but the defenses are very isolated. That dissonance is not a healthy distance to have.”Shlomo Kramer, cofounder and CEO of Cato Networks, echoed that view: “The era of cobbled-together security solutions is over.” Cato’s rapid growth underscores how businesses are moving to unified, cloud-based security to eliminate these gaps.Adversaries ranging from rogue attackers to nation-state cyberwar units are prioritizing the exfiltration of identities at scale and profiting from them for financial and political gain (sometimes both).It’s on security leaders and their teams to shift their security postures to adapt and stop identity-driven attacks, beginning with continuous authentication, least privilege access and real-time threat detection

VentureBeat
Feb 20th, 2025
Ai Vs. Endpoint Attacks: What Security Leaders Must Know To Stay Ahead

This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.Enterprises run the very real risk of losing the AI arms race to adversaries who weaponize large language models (LLMs) and create fraudulent bots to automate attacks.Trading on the trust of legitimate tools, adversaries are using generative AI to create malware that doesn’t create a unique signature but instead relies on fileless execution, making the attacks often undetectable. Gen AI is extensively being used to create large-scale automated phishing campaigns and automate social engineering, with attackers looking to exploit human vulnerabilities at scale.Gartner points out in its latest Magic Quadrant for Endpoint Protection Platforms that  “leaders in the endpoint protection market are prioritizing integrated security solutions that unify endpoint detection and response (EDR), extended detection and response (XDR) and identity protection into a single platform. This shift enables security teams to reduce complexity while improving threat visibility.”The result? A more complex threat landscape moving at machine speed while enterprise defenders rely on outdated tools and technologies designed for a different era.The scale of these attacks is staggering. Zscaler’s ThreatLabz indicated a nearly 60% year-over-year increase in global phishing attacks, and attributes this rise in part to the proliferation of gen AI-driven schemes. Likewise, Ivanti’s  2024 State of Cybersecurity Report found that 74% of businesses are already seeing the impact of AI-powered threats. And, nine in 10 executives said they believe that AI-powered threats are just getting started.“If you’ve got adversaries breaking out in two minutes, and it takes you a day to ingest data and another day to run a search, how can you possibly hope to keep up?” Elia Zaitsev, CTO of CrowdStrike noted in a recent interview with VentureBeat​.The new cyber arms race: Adversarial AI vs

AgFunder News
Feb 18th, 2025
Ransomware Attacks On Food And Ag Expected To Rise, Possible ‘Cascading Impacts’ On The Sector

Food and ag continues to be a target for ransomware attacks, according to a new report from threat intelligence agency the Food and Ag-ISAC (Information Sharing and Analysis Centers).“Farm-to-Table Ransomware Realities” examines ransomware attacks on the sector, which increased in 2024 and are predicted to rise further as threat actors target vulnerabilities in the supply chain. Last year, food and ag saw 212 ransomware attacks, up 27% from 167 in 2023.More than half of all attacks on food and ag are ransomware, says the Food and Ag-ISAC, which partners with the IT-ISAC to monitor ransomware incidents, Ransomware in food and agriculture now accounts for 5.5% of total ransomware attacks across industries. Of the 11 sectors monitored by ISAC, food and ag ranked sixth for ransomware attack volume.‘Cascading impacts’ on the whole sectorRansomware attacks put the company as well as its suppliers and partners at risk, notes the report, and a single disruption can have “cascading impacts” on the whole industry.As an example, the report highlights ransomware attacks impacting agricultural production lines:“Any downtime caused by an attack could lead to a chain reaction of delays, potentially causing late planting or harvesting windows. As a result, crops may need to be palletized and moved to other regions during an active growing season. This is already done in cases of severe weather, such as droughts or flooding, but it is an expensive and taxing process that strains limited resources.”The report also highlights the additional stressor of health and human safety being at risk when food and ag production are put at risk.Intellectual property — particularly where genetics are concerned — is also at risk, although the Food and Ag-ISAC notes that at this point, financial gain is the primary motivation for attacks on the sector.Who is making the attacks?RansomHub — a comparatively young ransomware group, having emerged in 2024 — carried out the most attacks on the food and ag sector last year.The group uses the “ransomware-as-a-service” model, where an operator recruits affiliates who pay to use the ransomware service. LockBit (see below) was previously the world’s most active RaaS group; law enforcement officials from 10 different countries disrupted the operation in 2024

PR Newswire
Feb 13th, 2025
Superna Announces New Integrations With Crowdstrike Falcon Next-Gen Siem To Bolster Ransomware Defense

MARLBOROUGH, Mass., Feb. 12, 2025 /PRNewswire/ -- Superna today announced a new partnership with CrowdStrike to integrate Superna's Data Security Edition with the industry-leading CrowdStrike Falcon® cybersecurity platform. Leveraging Falcon® Next-Gen SIEM , this integration drives SOC transformation and delivers real-time data protection, keeping businesses operational with file-level rollback from immutable snapshots.The speed and sophistication of cyber attacks continues to increase, with breakout times now measured in minutes. The Superna and CrowdStrike integration prevents advanced threats targeting critical data, accelerates detection and response, and streamlines security operations. Customers gain enhanced ransomware defense with the ability to detect storage anomalies early, prevent unauthorized access through automated user lockouts, and recover quickly with snapshots and file-level restoration. Additionally, fast host containment helps ensure compromised devices are quickly isolated, streamlining incident response within Falcon Next-Gen SIEM.Falcon Next-Gen SIEM integrates both native and third-party data, threat intelligence and AI-driven automation to stop breaches with speed and efficiency

Benzinga
Feb 13th, 2025
CrowdStrike Stock Is Hitting New Highs Thursday: What's Going On?

What Happened: CrowdStrike announced a breakthrough in agentic AI-driven security with the release of Charlotte AI Detection Triage.