Learn about the Falcon platform, internal tooling and ticketing systems used by Falcon Complete
Learn how to triage and analyse a wide variety of security alerts
Assist with triage of incoming customer inquiries to assess priority. Investigate and respond to requests to ensure customer environments are secure
Study CrowdStrike Falcon Modules and technologies to appropriately address new and emerging threats
Deliver and present a project to create or improve existing security controls or support business objectives
Perform basic malware analysis
Manage the Falcon platform and perform administrative tasks such as configuration changes and tuning
Handle high pressure situations in a productive and professional manner.
β
β
β
β
β
What You'll Need:
β
Fundamental understanding of information security and incident handling
Fundamental understanding of network communications
Collaboration is intrinsic to the success of our mission. Therefore, the strongest applicants will be those who can communicate effectively and frequently, and work well with fellow graduates and employees.
Desire to grow and expand technical and business skills
Graduates completing their studies by August 2026 Β in Computer Science, Computer Engineering, Maths, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, or any related field. Β
β
β
β
β
Bonus Points:
Experience in one or more of the following areas:
β
Incident Handling: experience conducting or managing incident response for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hactivists.
Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise.
Systems Administration: an understanding of system internals is required to understand how to implement and execute countermeasures and remediation.
Network Forensic Analysis: knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs.
Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware
Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations.
Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations.
Emerging and Innovative Technologies: understanding of applications and uses of Artificial Intelligence or Machine Learning in the cyber security domain.