FunctieomschrijvingJob Description As a System Administrator – CrowdStrike, you will:
Onboard and configure log sources within the CrowdStrike platform.
Develop and fine-tune use cases for anomaly detection to strengthen security monitoring.
Manage users, groups, and role-based permissions to ensure secure and compliant access control.
Optimize log ingestion and data flows for efficiency and cost-effectiveness.
Generate and maintain administrative reports for stakeholders.
Respond to security incidents and assist in incident analysis and remediation.
What You Bring to the Table:
Experience: 8–10 years of experience in system administration and security operations, with hands-on expertise in CrowdStrike Endpoint Detection and Response (EDR).
Strong understanding of log management, onboarding, and correlation.
Familiarity with anomaly detection techniques and security use case development.
Knowledge of role-based access control (RBAC) principles.
Experience in incident response and working with SOC teams.
Ability to produce and present clear administrative reports.
You should possess the ability to:
Work with cross-functional security and infrastructure teams to onboard and maintain log sources.
Optimize log ingestion pipelines and troubleshoot integration issues.
Quickly detect, analyze, and respond to potential security threats.
Document processes, maintain reporting dashboards, and communicate findings clearly.
Collaborate effectively in a team environment, ensuring high-quality deliverables within deadlines.
What We Bring to the Table:
Opportunity to work with industry-leading EDR technology (CrowdStrike).
Exposure to enterprise-scale security operations and log management optimization.
Collaborative work culture with focus on continuous improvement and security innovation.
Hands-on involvement in incident response and threat detection use case development.
Let’s Connect
Want to discuss this opportunity in more detail? Feel free to reach out.
Requirements As a System Administrator – CrowdStrike, you will: Onboard and configure log sources within the CrowdStrike platform. Develop and fine-tune use cases for anomaly detection to strengthen security monitoring. Manage users, groups, and role-based permissions to ensure secure and compliant access control. Optimize log ingestion and data flows for efficiency and cost-effectiveness. Generate and maintain administrative reports for stakeholders. Respond to security incidents and assist in incident analysis and remediation. What You Bring to the Table: Experience: 8–10 years of experience in system administration and security operations, with hands-on expertise in CrowdStrike Endpoint Detection and Response (EDR). Strong understanding of log management, onboarding, and correlation. Familiarity with anomaly detection techniques and security use case development. Knowledge of role-based access control (RBAC) principles. Experience in incident response and working with SOC teams. Ability to produce and present clear administrative reports. You should possess the ability to: Work with cross-functional security and infrastructure teams to onboard and maintain log sources. Optimize log ingestion pipelines and troubleshoot integration issues. Quickly detect, analyze, and respond to potential security threats. Document processes, maintain reporting dashboards, and communicate findings clearly. Collaborate effectively in a team environment, ensuring high-quality deliverables within deadlines. What We Bring to the Table: Opportunity to work with industry-leading EDR technology (CrowdStrike). Exposure to enterprise-scale security operations and log management optimization. Collaborative work culture with focus on continuous improvement and security innovation. Hands-on involvement in incident response and threat detection use case development. Let’s Connect Want to discuss this opportunity in more detail? Feel free to reach out. Recruiter: Hema Murali Phone: +31 20 369 0609 ; Extn :132 Email: hema.m@stafide.nl LinkedIn: https://www.linkedin.com/in/hema-murali-315999329/