As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate an inclusive culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Our University Recruiting program is dedicated to attracting and cultivating the future leaders of this industry. This program offers paid positions for students and recent grads, designed to provide exposure to work that makes an impact while being supported through a structured experience with seasoned professionals. Ready to join a mission that matters? The future of cybersecurity starts with you.
About the Role
Help us protect CrowdStrike and its customers from the most advanced threats! CrowdStrike’s Machine Learning Operations, Response and Evaluation team is the gatekeeper of Falcon’s groundbreaking security detections that rely on Machine Learning models. Join us in improving these models through a variety of operational tasks.
What you’ll do
As a Machine Learning Operations, Response and Evaluation intern, you will assist in performing activities related to various aspects of security operations and data science. These tasks include but are not limited to:
Review Machine Learning detections by analyzing relevant data at scale
Improving detections
Reverse engineer malware binaries of different file types
Learn to determine a file’s legitimacy (identifying how malicious or clean a file is)
Learn about OS internals and living off-the-land (LOL) techniques
Responding to customer and support escalations about False Positives and False Negatives
Get exposure to adversarial emulation work such as kill-chains, adversary techniques, etc.
Identify process and tooling gaps that can improve daily operations of the team
Deliver a key project at the end of the internship period that highlights what you’ve learned, and how you’ve applied those learnings
Key Qualifications
Pursuing an Undergraduate (in third or final year) or Masters Degree within a relevant field/degree subject area
Passionate about cyber security, security operations, malware analysis or reverse engineering
Interest in understanding exploitation tradecraft and actor tactics, techniques and procedures (TTPs)
Have some knowledge/experience on Machine Learning/Artificial Intelligence
Highly organized and self-sufficient
Bonus Points
If you have experience with programming languages (C++, GoLang, DotNet, etc) or scripting languages (Python, Bash, PowerShell, etc. - Python is strongly preferred)
If you have experience in using a post-exploitation framework (for example Metasploit)
If you have some understanding of OS internals (for example, you are familiar with Win32 API calls on Windows)
If you know what a kill-chain is and you’ve previously heard about the MITRE ATT&CK Framework
Summer Internship Program Experience Teaser:
Access to Intern Executive Speaker Series
Development Workshops
Fun social mixers
Tech Talks
Volunteer events
Access to company events
Assigned Mentor
Continuous feedback
Paid Holidays
Swag and more!
Work from home stipend to help with remote desk set up