Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of raw intelligence and data
Apply analytic tradecraft to gathered intelligence in a consistent manner
Proactively identify and track adversary network infrastructure
Hunt for and perform basic triage of malicious file samples
Perform intrusion and attribution analysis
Provide finished intelligence analysis to internal and external customers through written reporting, in varying predetermined suspense and depth, with minimal supervision
Collaborate across teams to inform various functions within CrowdStrike Intelligence about activity of interest and to coordinate adversary/campaign tracking
Identify intelligence gaps and submit requests for information to fill gaps
Provide peer review of proposed/draft reporting to team members
Prioritize, categorize, and respond to requests for information from internal and external customers
Conduct briefings as needed for a variety of levels of customers as requested (via video conference, webcast, in-person briefing, or industry conference)
Requirements
Motivated self-starter with 4+ years’ experience in a threat intelligence environment, preferably with a focus on Russian cyber operations
Comprehensive, practical knowledge of intelligence research/collection, analysis, and production tradecraft, and structured analytic techniques
Ability to identify and track adversary tradecraft trends and experience performing intrusion and attribution analysis using frameworks such as the Diamond Model
Experience performing proactive adversary network infrastructure tracking using commercial tools
Ability to produce quality finished intelligence products incorporating estimative analysis on short deadlines, as well as continuing to maintain analysis for and report on long-term strategic assessments with minimal assistance
Understanding of technical terminology, tools, and tactics employed by threat actors
Ability or willingness to learn to conduct basic analysis of the tools and tradecraft used by threat actors on a technical level
Knowledge of geopolitical issues and ability to use that information to support understanding of current and future impacts on the cyber threat landscape
Undergraduate degree, military training or relevant experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc.
Other technical security certifications or academic background are a plus.
Benefits
Remote-friendly and flexible work culture
Market leader in compensation and equity awards
Comprehensive physical and mental wellness programs
Competitive vacation and holidays for recharge
Paid parental and adoption leaves
Professional development opportunities for all employees regardless of level or role
Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections
Vibrant office culture with world class amenities
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
technical security certificationsmilitary trainingundergraduate degree in cyber intelligenceundergraduate degree in computer scienceundergraduate degree in intelligence studiesundergraduate degree in security studiesundergraduate degree in political scienceundergraduate degree in international relations