About the Role:
Help us protect CrowdStrike and its customers from the most advanced threats! CrowdStrike’s Threat Detection and Response Efficacy works with the Malware Research Center on adversarial emulation to improve detections by CrowdStrike’s products.
What you’ll do:
- As a Threat Detection and Response Efficacy intern, you will assist in building tools and performing activities related to various aspects of security including, but not limited to: tactics and techniques, adversarial emulation, documentation and kill chain development.
- Create a kill-chain or set of kill chains and measuring the product against either the adversary or top-threat class
- Identifying adversary techniques
- Identifying detection gaps and in guiding detection innovation
Key Qualifications
- Pursuing an Undergraduate (in third or final year) Degree or Masters within a relevant field/degree subject area
- Passionate about cyber security, malware analysis and reverse engineering
- Interest in understanding exploitation tradecraft and actor tactics, techniques and procedures (TTPs)
- Highly organized
Bonus Points
You have experience with one or more scripting languages, Python, Powershell, Javascript, etc If you have experience in using a post-exploitation framework (for example Metasploit) Splunk or SIEM knowledge MITRE ATT&CK Framework knowledge
What You Can Expect:
- Executive Speaker Series & Tech Talks Fun socials and give-back events (e.g. virtual trivia, escape rooms, etc.)
- Development workshops to grow your soft and hard skills
- Networking opportunities with fellow interns and CrowdStrikers
- Owning impactful projects that move the company forward
- Working alongside a diverse and global team