DESPRE COMPANIE

​​#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity.

Machine Learning Response, Evaluation and Operations Internship - Summer 2025
Stagiu plătit la CrowdStrike · 06/07/2025
Categorii:
  • – Artificial Intelligence
  • – Cybersecurity
Oraș:
  • room București
Aptitudini necesare:

bash machine learning win32 artificial intelligence python

About the Role Help us protect CrowdStrike and its customers from the most advanced threats! CrowdStrike’s Machine Learning Operations, Response and Evaluation team is the gatekeeper of Falcon’s groundbreaking security detections that rely on Machine Learning models. Join us in improving these models through a variety of operational tasks.

What you’ll do As a Machine Learning Operations, Response and Evaluation intern, you will assist in performing activities related to various aspects of security operations and data science. These tasks include but are not limited to:

  • Review Machine Learning detections by analyzing relevant data at scale
  • Improving detections
  • Reverse engineer malware binaries of different file types
  • Learn to determine a file’s legitimacy (identifying how malicious or clean a file is)
  • Learn about OS internals and living off-the-land (LOL) techniques
  • Responding to customer and support escalations about False Positives and False Negatives
  • Get exposure to adversarial emulation work such as kill-chains, adversary techniques, etc.
  • Identify process and tooling gaps that can improve daily operations of the team
  • Deliver a key project at the end of the internship period that highlights what you’ve learned, and how you’ve applied those learnings

Key Qualifications

  • Pursuing an Undergraduate (in third or final year) or Masters Degree within a relevant field/degree subject area
  • Passionate about cyber security, security operations, malware analysis or reverse engineering
  • Interest in understanding exploitation tradecraft and actor tactics, techniques and procedures (TTPs)
  • Have some knowledge/experience on Machine Learning/Artificial Intelligence
  • Highly organized and self-sufficient

Bonus Points

  • If you have experience with programming languages (C++, GoLang, DotNet, etc) or scripting languages (Python, Bash, PowerShell, etc. - Python is strongly preferred)
  • If you have experience in using a post-exploitation framework (for example Metasploit)
  • If you have some understanding of OS internals (for example, you are familiar with Win32 API calls on Windows)
  • If you know what a kill-chain is and you’ve previously heard about the MITRE ATT&CK Framework