About the Role:
CrowdStrike Counter Adversary Operations, a core component of CrowdStrike, is seeking a motivated reverse engineer with excellent technical skills to research nation state adversary operations used in targeted intrusions. Our Technical Analysis Cell (TAC) is at the forefront of CrowdStrikeβs mission against state-sponsored adversaries and criminal actors. We combine intelligence analysis with deep-dive reverse engineering and malicious code analysis, in addition to building and using automation systems to deliver actionable indicators and operational insights. This highly technical position on the TAC Targeted Intrusion team serves an important role in conducting research, increasing our coverage of the global threat landscape, contributing to the continuous tracking of targeted intrusion and nation state adversaries, and ultimately developing finished intelligence products that provide a decision advantage to customers.
We are ideally looking for a specialist in targeted intrusions and tracking of nation state adversaries. That said, we are also open to applications by talented malware researchers or reverse engineers without significant knowledge in this field who are willing to rapidly expand their skills to successfully carry out the following duties:
β
β
β
What You'll Do:
Technical Analysis:
- Discover, investigate and track advanced cyber intrusions and document findings.
- Enhance understanding of the tools and malware used in intrusions through reverse engineering.
- Develop tools to assist with automation of malware reverse engineering tasks and tracking of threat actors.
- Create host-based and network-based signatures suited for large-scale hunting, detection, and tracking of threats.
β
β
β
β
Intelligence Reporting:
- Produce high-quality threat intelligence reporting for all levels of readership, including actionable mitigation and detection guidance.
- Collaborate across teams to inform various functions within CrowdStrike Intelligence and beyond about activity of interest, to coordinate adversary and campaign tracking, and to provide support to teams developing mitigation strategies and responding to incidents.
β
β
β
β
β
What You'll Need:
Essential:
- Actively enrolled in university in your penultimate year of study for Computer Science, Cyber Security or related field (2027 Graduate)
- Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) combined with ongoing interest and ability to learn and self-teach new techniques.
- Knowledge of programming and scripting languages, in particular Python.
- Ability to accurately express complex technical and non-technical concepts in written, verbal and graphical products.
- Strong problem solving skills are a must.
- Team player.
β
β
β
β
Bonus Points:
- Ability to interpret raw network data and to develop network signatures, as well as custom protocol decoders and decryption tools.
- Familiarity with targeted intrusions and tracking of state-operated adversaries.
- A background in intelligence is a plus.
β
β
β
β
This is a 12 week internship taking place from Monday 1st June until Friday 21st August.β
β