Next-Generation Endpoint Protection • Endpoint Detection and Response • Next Generation Anti-Virus • Managed Threat Hunting • Incident Response
November 25
Next-Generation Endpoint Protection • Endpoint Detection and Response • Next Generation Anti-Virus • Managed Threat Hunting • Incident Response
• The Advanced Research Team (ART) within CrowdStrike Intelligence is responsible for researching and publishing on topics related to information security. • Providing technical expertise to other teams, developing tools to support analysts in their day-to-day duties, and collecting technical artifacts about adversary activity. • Interns within ART will be assigned a project based on their individual skillset and team needs at the time of the internship, on topics including but not limited to: • Develop automated solutions for collecting, processing and analyzing data at scale, e.g. malware samples, network traffic, or Internet-wide scanning data • Operate, extend and create honeypots to identify and detect adversary TTPs • Perform vulnerability research, e.g. Analyze vendor patches to recover vulnerability information • Identify new vulnerabilities in applications or products • Develop proof-of-concept exploits • Collaborate across other teams at CrowdStrike Intelligence and beyond to satisfy unique technical collection requirements, inform on information security topics, reproduce emerging vulnerabilities, and provide actionable technical information.
• Currently completing your penultimate year of University (2026 graduate) and working towards a MS degree in Computer Science, Computer Engineering, Math, Information Security, Cybersecurity, or a related field. • An eagerness to learn through hands-on experience and collaborative projects specific to your internship field. • At least two of the following skills: • Software development experience, ideally in Python • Information security background, e.g. experience in vulnerability research or reverse engineering • Understanding of operating system internals and network protocols • Bonus Points: • Successful participation in Capture the Flag (CTF) competitions • Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) • Experience with mobile platforms and operating systems (e.g. Android, iOS) • Experience with the Go or Rust programming languages • Having an investigative mindset and desire to stop evil. • Self motivated and actively seeking opportunities for growth. • Desire to rapidly increase skills. • Crave new and innovative work.
Apply Now