CrowdStrike Logo

CrowdStrike

Delivery Manager, Incident Response Partner Services (Remote)

Posted 2 Hours Ago
Be an Early Applicant
Remote or Hybrid
Hiring Remotely in USA
125K-190K
Senior level
Remote or Hybrid
Hiring Remotely in USA
125K-190K
Senior level
The Delivery Manager in Incident Response leads forensic investigations, collaborates with incident response teams, supports partner communication, and mentors teams, focusing on enhancing security postures during incidents.
The summary above was generated by AI

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.

About the Role:

CrowdStrike is looking for a highly motivated, self-driven incident response manager to oversee forensic investigations performed by CrowdStrike’s trusted partners. This Partner Services manager will be dedicated to making a difference in global security by protecting organizations against a wide range of attackers. This manager will coordinate directly with both CrowdStrike’s incident response leadership and the leadership of our partners and customers, representing CrowdStrike and helping deliver high-quality results during high-stakes incident response investigations.

 

Am I a Partner Services Delivery Manager Candidate?

  • Have you led teams through complicated incident response investigations?

  • Have you managed and built trust with teams of incident responders? 

  • Are you comfortable with communicating about technical incident response findings to customer leadership, especially during high-pressure situations?

  • Do you find yourself interested in and keeping up with the latest vulnerabilities and breaches?

  • Are you self-motivated and looking for an opportunity to rapidly accelerate your skills?

  • Do you crave new and innovative work that actually matters to your customer?

  • Do you have an Incident Response or Information Security background that you’re not fully utilizing?

  • Are you a mentor who can naturally teach your colleagues new methods and approaches?

  • Do you love working around like-minded, smart people who you can learn from on a daily basis?

 

What You'll Do:

  • Oversee incident response engagements performed by CrowdStrike’s partners

  • Provide practical connections between partner responders and CrowdStrike’s incident response practice

  • Help ensure alignment between customers and CrowdStrike partners around investigation scope, objectives, and level of effort involved to complete objectives 

  • Support partners in effectively communicating with executives on the topics of forensics and malware analysis

  • Help train partners on new methods to hunt for bad actors across large sets of data

  • Effectively coordinate under the direction of outside counsel

  • Coach and mentor partners on advanced methods of  performing host and/or network-based forensics across Windows, Mac, and Linux platforms

  • Help review and provide strategic, applicable, and feasible recommendations to help mature the security posture of organizations during and after an incident

  • Review written and verbal reports, presentations, recommendations, and findings for key stakeholders, including customer management, regulators, and legal counsel, to ensure alignment with CrowdStrike quality standards

  • Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events

 

What You'll Need:

Successful candidates will have experience in one or more of the following areas:

  • Team leadership experience in a matrixed consulting environment

  • Previous experience developing and managing partner relationships in a consulting environment, preferably involving incident response

  • Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists

  • Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise

  • Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs

  • Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis

  • Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations

  • Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations

  • Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies

 

Additionally, all candidates must possess the following qualifications:

  • Capable of reviewing technical investigation results for accuracy, consistency, and completeness

  • Desire to grow and expand both technical and soft skills

  • Strong project management skills

  • Contributing thought leader within the incident response industry

  • Ability to foster a positive work environment and attitude

  • Ability to travel on short notice, up to 30% of the time

Education: 

BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field. Applicants without a degree but with relevant work experience and/or training will be considered.

 

#LI-Remote

#LI-AC1 

This role may require the candidate to periodically undergo and pass alcohol and/or drug test(s) during the course of employment.

Benefits of Working at CrowdStrike:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Comprehensive physical and mental wellness programs 

  • Competitive vacation and holidays for recharge  

  • Paid parental and adoption leaves

  • Professional development opportunities for all employees regardless of level or role

  • Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Great Place to Work Certified™ across the globe

CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program.

CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.

If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at [email protected] for further assistance.

Find out more about your rights as an applicant.

CrowdStrike participates in the E-Verify program.

Notice of E-Verify Participation

Right to Work

CrowdStrike, Inc. is committed to equal pay for equal work in its compensation practices. The base salary range for this position in the U.S. is $125.000 - $190.000 per year + variable/incentive compensation + equity + benefits. A candidate's salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location.

Expected Close Date of Job Posting is:10-05-2025

Top Skills

AWS
Azure
Cloud Incident Response
Computer Forensic Analysis
GCP
Incident Response
Malware Analysis
Network Forensics

Similar Jobs at CrowdStrike

2 Hours Ago
Remote or Hybrid
USA
125K-190K
Senior level
125K-190K
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a Principal Consultant, you will lead efforts in deploying SIEM solutions, advise customers, and integrate Falcon products for enhanced cybersecurity.
Top Skills: ArcsightAWSAzureCriblCrowdstrikeExabeam Data LakeFalcon NgsiemGCPGoJavaScriptLogrhythmPalo AltoPostmanPowershellPythonQradarRest ApiSplunkYaml
2 Hours Ago
Remote or Hybrid
USA
125K-190K
Senior level
125K-190K
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Principal Consultant will lead Falcon LogScale implementations, guide customers in building resilient applications, and provide technical expertise and support during deployment.
Top Skills: Active DirectoryAWSAzureBashCi/CdCrossplaneDockerGCPGoGraphQLHelmKafkaKubernetesLinuxOauthOktaPulumiPythonRestful ApiSAMLTerraform
2 Hours Ago
Remote or Hybrid
USA
135K-215K
Senior level
135K-215K
Senior level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Engineering Manager will optimize data center and cloud network infrastructure, drive cloud initiatives, and lead operational excellence while engaging with vendors and collaborating with service partners.
Top Skills: AnsibleAWSBirdChefEvpnFrrGCPHaproxyIpsecLinuxMacsecMp-BgpNgnixOciOpenstackOspfQosSonicTerraformVrfVxlan

What you need to know about the Charlotte Tech Scene

Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.

Key Facts About Charlotte Tech

  • Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
  • Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
  • Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
  • Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account