At a Glance
- Tasks: Conduct research on cyber threats and develop tools to combat malware.
- Company: Join CrowdStrike, a leader in cybersecurity with a mission-driven culture.
- Benefits: Enjoy competitive pay, paid holidays, and professional development opportunities.
- Other info: Fully remote internship with a vibrant culture and growth opportunities.
- Why this job: Make a real impact in cybersecurity while learning from industry experts.
- Qualifications: Pursuing a degree in relevant fields and experience in malware research.
The predicted salary is between 20000 - 30000 £ per year.
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward.
We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other.
Our University Recruiting program is dedicated to attracting and cultivating the future leaders of this industry. This program offers paid positions for students and recent grads, designed to provide exposure to work that makes an impact while being supported through a structured experience with seasoned professionals.
About the Role:
The Intelligence Analyst Internship is fully remote and requires no travel. Your work location is the city/town/province you will be working from remotely. Interns are also invited to work out of the CrowdStrike office located closest to their remote location.
What You'll Do:
- The team you are applying to – the Applied Research Cell (ARC) — lives at the intersection between software engineering, malware analysis, and cyber threat intelligence connecting the two worlds of reverse engineering and forward engineering.
- Conducting and evaluating open source research on cyber threats.
- Learning cyber security concepts and threat actor Tactics, Techniques and Procedures (TTPs).
- Conducting research on predetermined malware families and learning about various triage techniques.
- Developing tools and integrating them to high-scale malware processing pipelines.
The internship will be scoped in a project to be completed during 12 weeks.
What You'll Need:
- Currently completing your penultimate year of University (2027 graduate) and be working towards a BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.
- An eagerness to learn through hands-on experience and collaborative projects specific to your internship field.
- Experience in malware research.
- Experience with programming (Python, C or similar languages).
Bonus Points:
- Having an investigative mindset and desire to stop evil.
- Self motivated and actively seeking opportunities for growth.
- Desire to rapidly increase skill set.
- Crave new and innovative work.
This is a 12 week part-time internship commencing on Monday 5th October and completing on Thursday 24th December.
What You Can Expect:
- Market leader in compensation and equity awards.
- Paid holidays (including birthday holidays) and 401k matching (where applicable).
- Professional development opportunities including workshops, tech talks, and Executive Speaker Series.
- Assigned mentors from across the company for continuous support and feedback.
- Participation in companywide initiatives including FalconFIT, Wellness Programs, and Employee Assistance Program.
- Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections.
- Vibrant office culture with world class amenities.
- Ownership of impactful projects that move the company forward.
- Great Place to Work Certifiedâ„¢ across the globe.
CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed.
Intelligence Intern - Applied Research Cell (Remote) employer: CrowdStrike
Contact Detail:
CrowdStrike Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Intelligence Intern - Applied Research Cell (Remote)
✨Tip Number 1
Network like a pro! Reach out to current or former CrowdStrike employees on LinkedIn. Ask them about their experiences and any tips they might have for landing the internship. Personal connections can make a huge difference!
✨Tip Number 2
Prepare for the interview by brushing up on your knowledge of cybersecurity concepts and threat actor TTPs. Show us that you’re not just passionate but also knowledgeable about the field. We love candidates who can engage in meaningful discussions!
✨Tip Number 3
Don’t forget to showcase your programming skills! If you’ve worked on any relevant projects, be ready to discuss them. We want to see your hands-on experience with languages like Python or C, so bring your A-game!
✨Tip Number 4
Finally, apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows us you’re serious about joining the CrowdStrike mission. Let’s stop breaches together!
We think you need these skills to ace Intelligence Intern - Applied Research Cell (Remote)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Intelligence Intern role. Highlight relevant coursework, projects, and any experience in cybersecurity or programming. We want to see how your background aligns with what we do at CrowdStrike!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for cybersecurity and why you’re excited about this internship. Let us know how you can contribute to our mission of stopping breaches and making an impact.
Show Off Your Skills: If you've got experience in malware research or programming, make it pop! Include specific examples of projects or tools you've worked on. We love seeing candidates who are self-motivated and eager to learn.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way to ensure your application gets into the right hands. Plus, it shows you’re serious about joining the CrowdStrike team!
How to prepare for a job interview at CrowdStrike
✨Know Your Cybersecurity Basics
Before the interview, brush up on fundamental cybersecurity concepts and the latest trends in threat intelligence. Familiarise yourself with common Tactics, Techniques, and Procedures (TTPs) used by threat actors. This will not only show your enthusiasm but also help you engage in meaningful discussions during the interview.
✨Showcase Your Research Skills
Prepare to discuss any previous experience you have with malware research or open-source intelligence. Bring examples of projects you've worked on, highlighting your investigative mindset and how you approached problem-solving. This will demonstrate your readiness for the hands-on work expected in the internship.
✨Communicate Effectively
Since this role involves collaboration, practice articulating your thoughts clearly and concisely. Be ready to explain complex ideas in simple terms, as effective communication is key in a remote setting. Consider doing mock interviews with friends or mentors to refine your delivery.
✨Ask Insightful Questions
Prepare thoughtful questions about the Applied Research Cell and the projects you might be involved in. Inquire about the tools and technologies they use, or ask about the team dynamics. This shows your genuine interest in the role and helps you assess if it's the right fit for you.