CrowdStrike Logo

CrowdStrike

Sr.Training Instructor - Next-Gen SIEM (Remote, AUS)

Posted 2 Days Ago
Be an Early Applicant
Remote
8 Locations
Mid level
Remote
8 Locations
Mid level
As a Sr. Training Instructor for CrowdStrike, you will deliver training on Next-Gen SIEM technologies, guiding clients to enhance their cybersecurity skills. Your role involves conducting courses, creating training programs, and collaborating with experts while leveraging your own security experience to provide insights and practical knowledge to learners.
The summary above was generated by AI

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

As an Instructor within CrowdStrike's Services Training and Education team focused on our Next-Gen SIEM technology, you will play a pivotal role in empowering our clients to defend against sophisticated cyber threats. This role goes beyond traditional teaching; it involves translating your real-world security experience into actionable insights that help students elevate their defensive capabilities. Leveraging our Next-Gen SIEM module in the Falcon platform, you will guide learners in APAC through immersive, hands-on training sessions designed to prepare them for the challenges of an ever-evolving threat landscape. We seek a passionate educator who can inspire and equip our clients to stay ahead of the curve in cybersecurity.
 

Am I an Instructor Candidate?

  • Experienced in SIEM: Have you worked at a top SIEM vendor and have a deep background in all things logging and data?

  • Effective Communicator: Can you simplify complex cybersecurity topics for audiences with varying skill levels?

  • Storyteller: Can you engage learners by weaving stories that solidify key concepts?

  • Industry Leader: Are you ready to represent the cutting edge of CrowdStrike’s technology with credibility?

  • Customer-Focused: Can you adapt and retrain customers who may need to unlearn old habits to embrace new strategies?

  • Collaborative Learner: Do you thrive in an environment where you can learn from others while also sharing your knowledge?

What You'll Do:

  • Present and lead courses with a heavy focus on CrowdStrike’s SIEM and Log Aggregation technologies, as well as CrowdStrike Falcon’s endpoint security, cloud security, identity protection, identity protection and security & IT operations, typically 3-4 days per week

  • Work effectively at a distance: conduct web-meeting-based course delivery; interact and integrate with coworkers globally

  • Conduct occasional on-site course delivery (typically three to give days of travel at a time.)

  • Collaborate with curriculum developers and subject matter experts to design impactful training programs for customers and partners

  • Serve as a subject matter expert to field sales by promoting the education service line and its benefits to potential clients and internal employees.

  • Demonstrate strong written communication skills by contributing to the development of instructional materials, and providing clear, concise written feedback to learners

What You'll Need:

  • You have experience with one or more SIEM/SOAR products (Splunk, Exabeam, Trellix, Elastic Stack, LogRhythm, QRadar, etc.)

  • Proven experience in delivering technical training to diverse audiences, from IT support staff to executives

  • Polished and professional demeanor, effective in both technical and executive settings

  • Strong verbal and written communication skills, capable of simplifying complex topics and engaging an audience

  • Ability to manage your time effectively and deliver high-quality work with minimal supervision

  • Eager to continually develop both technical and soft skills

  • Competent in managing multiple projects and delivering on time

  • A team player who fosters a collaborative and positive work environment

  • Ability to travel on occasion

Bonus Points:

  • Experience developing and conducting technical training on SIEM and/or log aggregation products

  • Bachelor’s or Master’s degree in Computer Science, Information Security, Cybersecurity, or related fields.

  • Subject Matter Expertise in one or more of the following domains:

    • SIEM or Log Management: Experience with configuring, managing, and analyzing data from SIEM platforms or log management tools to detect and respond to security incidents.

    • Cloud Security: Proficient in securing cloud environments, including experience with cloud security frameworks, identity and access management, and threat detection in cloud platforms.

    • Identity Protection: Knowledge of identity protection strategies, including multi-factor authentication, identity governance, and monitoring for compromised credentials.

    • Incident Response: Experience in managing or conducting incident response investigations involving advanced threats

    • Intelligence: experience conducting cyber threat analysis of targeted threat actors, using an established analytic model to produce FINTEL and/or technical output.

    • Digital Forensics: Skilled in using forensic analysis tools to determine the scope of security incidents.

    • Security Engineering: Experience with designing, implementing, and managing security tools and platforms, including endpoint protection, firewalls, and security policy enforcement.

    • Some programming/scripting experience: Python, PowerShell, BASH, etc.

#LI-JC1

#LI-Remote

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs

  • Competitive vacation and holidays for recharge

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Top Skills

Bash
Powershell
Python

Similar Jobs at CrowdStrike

Be an Early Applicant
19 Hours Ago
6 Locations
Remote
10,000 Employees
Senior level
10,000 Employees
Senior level
Cloud • Information Technology • Sales • Security • Cybersecurity
As a Senior CAO Analyst at CrowdStrike, you will provide cyber threat analysis, maintain customer relationships, prepare intelligence reports, and respond to customer inquiries related to threat intelligence and hunting. You will work closely with clients and internal teams to enhance security measures and customer satisfaction.
Be an Early Applicant
2 Days Ago
9 Locations
Remote
10,000 Employees
Senior level
10,000 Employees
Senior level
Cloud • Information Technology • Sales • Security • Cybersecurity
As a Cloud Incident Response Consultant at CrowdStrike, you'll lead cloud incident response engagements, manage forensic analysis projects, and conduct technical assessments in AWS, Azure, and GCP environments. You'll also guide organizations in responding to threats, produce detailed reports for management, and demonstrate thought leadership in the cybersecurity field.
2 Days Ago
5 Locations
Remote
10,000 Employees
Entry level
10,000 Employees
Entry level
Cloud • Information Technology • Sales • Security • Cybersecurity
CrowdStrike is seeking motivated Cyber Security Analysts to protect organizations from advanced threats. Responsibilities include incident handling across various platforms, malware analysis, and improving incident detection processes. Senior Analysts also mentor junior staff and demonstrate thought leadership in cybersecurity.

What you need to know about the Melbourne Tech Scene

Home to 650 biotech companies, 10 major research institutes and nine universities, Melbourne is among one of the top cities for biotech. In fact, some of the greatest medical advancements were conceptualized and developed here, including Symex Lab's "lab-on-a-chip" solution that monitors hormones to predict ovulation for conception, and Denteric's vaccine for periodontal gum disease. Yet, the thousands of people working in the city's healthtech sector are just getting started, to say nothing of the tech advancements across all other sectors.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account