Threat Analyst Intern

Our CrowdStrike Data Science Threat Detections and Response, Efficacy Team is looking for a Threat Analyst Intern. This role will be perfect for anyone who is just starting or considering a career involving reverse engineering and detection. This team is focused on improving detection capability and efficiency through analysis of malware or other threat detections impacting our customer base. Bring your passion for helping internal partners resolve questions about our threat detections and our detection capability. Our goal for the Investigations team is to both help internal teams respond to customer-inquiries about threat detection and to provide information about the effects of our detections into the Data Science organization – including detection efficacy and managing false positive detections.

What you’ll do
As a Threat Detection and Response Efficacy intern, you will assist in building tools and performing activities related to various aspects of security including, but not limited to: tactics and techniques, adversarial emulation, documentation and kill chain development. You’ll learn about

  • Product detections to ensure they are performing to the company standard

  • Perform tasks to enable better-management of false positive detections

  • Analyze binary files to determine their legitimacy

What You Can Expect:

  • Executive Speaker Series & Tech Talks

  • Fun socials and give-back events (e.g. virtual trivia, escape rooms, etc.)

  • Development workshops to grow your soft and hard skills

  • Networking opportunities with fellow interns and CrowdStrikers

  • Owning impactful projects that move the company forward

  • Working alongside a diverse and global team


Minimum Education Level: Student

Key Qualifications

  • Pursuing an Undergraduate (in third or final year) Degree or Masters within a relevant field/degree subject area

  • Passionate about cyber security, malware analysis and reverse engineering

  • Interest in understanding exploitation tradecraft and actor tactics, techniques and procedures (TTPs)

  • Highly organized

Bonus Points

  • You have experience with one or more scripting languages, Python, Powershell, Javascript, etc

  • Splunk or SIEM knowledge

  • MITRE ATT&CK Framework knowledge

  • Experience in a security operations center or similar environment responding to incidents

Here’s what our previous interns have to say about our program:

Posted: February 22, 2022
<< Back to Job-Board