Asscoiate CAO Elite Analyst Intern (Remote, GBR)

GBR Remote

CrowdStrike

CrowdStrike is a global cybersecurity leader with an advanced cloud-native platform for protecting endpoints, cloud workloads, identities and data.

View all jobs at CrowdStrike

Apply now Apply later

​​#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity. Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.

About OverWatch:
On a daily basis, the OverWatch Elite Threat Response Team develops a meaningful partnership with clients by exchanging threat intelligence with clients, providing threat briefings to diverse audiences, drafting communication around threat detections, performing hypothesis & statistical driven hunts, leading customer meetings, and acting as liaison between customers and threat hunting teams.  

Threat Response Analysts on the team spend their time threat hunting and engaging with clients on emerging threats, hunting operations, and what OverWatch is seeing in the threat landscape.
The OverWatch Elite team delivers a ‘White Glove’ service to augment OverWatch threat hunting and provides a personal consultative threat response experience to customers that want to engage with proactive, professional, helpful threat hunters.
 

About the Role:

To succeed as an OverWatch Threat Hunter intern you must be an adaptable team-player who loves learning. You must be familiar with threat hunting operations and possess the technical problem-solving skills that enable our customers to stop breaches. Customer service skills are critical to this role’s success.


What You'll Do:

Develop high-quality customer deliverables that meet the expectations of the service OverWatch Elite provides its customers. This includes:

  • Hunting for threats, anomalies and cyber-related disruptions on customer endpoints

  • Performing threat analysis, deep-dives and incident assessments

  • Researching and assessing customer’s threats and IOCs

  • Conducting ongoing customer environment assessments

  • Conducting research and presenting threat briefings to a large audience

What You'll Need:

  • Actively enrolled in university and completing an undergraduate degree in Cybersecurity, Computer Science or related field in your penultimate year of study (2026 graduate)

  • Strong analytical and problem-solving skills

  • Excellent communication and collaboration skills

  • Knowledge of Data Science Concepts and tools is a plus

  • Interest in Cybersecurity and\or AI

  • You are curious and keep up-to-date across the cybersecurity landscape

  • You have the ability to think analytically and possess basic critical thinking skills to assess activity quickly and accurately

  • You have basic knowledge of operating systems fundamentals (Windows, Linux, MacOS)

  • Although CrowdStrike is a primarily remote company, collaboration is intrinsic to the success of our mission. Therefore, the strongest applicants will be those who can communicate effectively and frequently, and work well with fellow interns and employees.

Bonus Points:

  • Prior cyber experience in any of the following:

  • Threat response

  • Intrusion analysis

  • Endpoint incident response (MAC, Linux, and/or Windows)

  • Malware analysis

  • Penetration testing

  • Threat hunting

  • Information security consulting

  • Intelligence

  • Experience with big-data processing tools such as Splunk, Humio, Logstash, Kibana, etc.

  • Basic understanding of MITRE ATT&CK techniques / sub-techniques

This is a 12 week internship commencing on Monday 2nd June and completing on Friday 22nd August.

#LI-Remote

#LI-RM1

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.

Apply now Apply later
Job stats:  29  11  0
Category: Analyst Jobs

Tags: Cloud Computer Science CrowdStrike Incident response Linux MacOS Malware MITRE ATT&CK Pentesting Splunk Threat intelligence Windows

Regions: Remote/Anywhere Europe
Country: United Kingdom

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.