At CrowdStrike we’re on a mission - to stop breaches. Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner. Because of that we’ve earned numerous honors and top rankings for our technology, organization and talent. Our culture was purpose-built to be remote first, and we offer flexible work arrangements to help our people manage their personal and professional lives in a way that works for them. If you’re ready to work on unrivaled technology with a team that makes a difference every day, let’s talk.
About the Role
The CrowdStrike Services Internship Programme is a 12-week full-time summer internship that provides individuals with experience across all major aspects of the CrowdStrike Services business, with a focus on Incident Response.
Interviews to commence in November 2021 (Applications Open October 2021-November 2021)
After completing this programme, candidates will have experience in the following areas
Infrastructure
- Networking Fundamentals
- Active Directory and Enterprise Network Fundamentals
CrowdStrike Tools
- Falcon Endpoint Protection Platform (EPP)
- Falcon Forensics Collector (FFC)
Forensics and Triage
- Windows and Linux Disk Forensics (X-Ways Forensics and Magnet AXIOM)
- Forensic Analysis via Supertimelining (Plaso/log2timeline)
- Log Analysis
- Cloud forensics:
- Amazon Web Services (AWS)
- Microsoft Azure
Proactive Services
- Red Team Operations
- Tabletop Exercises
- Cybersecurity Maturity Assessments
- Compromise Assessments
Project Management and Reporting
- Incident Response Reporting
- Client Communication and Management
- Handling complex incidents, including those involving ransomware and sophisticated nation state adversaries
What You’ll Need
- Be working towards a BA/BSc/BEng or MA/MSci/MEng undergraduate degree in Cybersecurity, Computer Forensics, Computer Science, Computer Systems Engineering, Electronic & Electrical Engineering, Mathematics, Information Security, Information Systems, Information Assurance, Information Security Management, Intelligence Studies, Data Science or any other related field. Applicants will be considered from courses other than this example list where applicable experience and aptitude is demonstrated.
- Be in the penultimate year of your undergraduate programme, i.e. your:
- Second year of a three-year Bachelor’s programme;
- Third year of a four-year year in industry (“sandwich”) programme; or
- Third year of a four-year integrated Master’s undergraduate programme.
- Be scheduled to graduate on or around Summer of 2023.
- Be willing and able to work in London during Summer of 2022. The London team operates on a hybrid work model, so you should be prepared to work from the London office between zero and five days per week subject to public health measures, team requirements, and the programme’s mentorship schedule. Further details on this will be provided closer to the time.
Bonus Points
Successful candidates will have experience in one or more of the following areas
- Have an investigative mindset and a desire to find and stop evil
- Keep up with the latest vulnerabilities and breaches
- Be self-motivated and actively seek opportunities for growth
- Desire to rapidly accelerate their skills
- Crave new and innovative work
- Be able to complete technical tasks with minimal supervision
- Desire to develop both technical and soft skills
- Contribute to a positive work environment, and have a can-do attitude
- Be seeking a career in cybersecurity and/or incident response
From a technical perspective, it is desired (but not required) that candidates
- Be comfortable with command-line interfaces (Windows, Linux, macOS, or any combination of those)
- Be familiar with scripting languages (PowerShell, Python 3, etc.)
- Be versed in forensic analysis methodology for Windows systems (Mac/Linux forensics knowledge is a plus)
- Be acquainted with strategies and tools to rapidly analyze large sets of logs (such as Splunk, ELK, etc.)
What You Can Expect
- Executive Speaker Series & Tech Talks
- A rigorous, world-leading incident response course built especially for our CrowdStrike Incident Response interns delivered by subject matter experts right across the division, covering the full incident response lifecycle, including:
- Host forensic analysis
- Cloud forensics
- Large-scale log analysis techniques
- Consulting and project management skills
- Introductory red teaming to understand an attack from the adversary’s perspective
- Introductory strategic consulting (table top exercises, maturity assessments, etc.)
- The CrowdStrike Falcon platform
- Specific tech talks on deployment, handling ransomware, etc.
- The opportunity to work on a mock engagement run entirely by interns end to end
- Much more!
- Fun socials and give-back events (e.g. virtual trivia, escape rooms, etc.)
- Development workshops to grow your soft and hard skills
- Networking opportunities with fellow interns and CrowdStrikers
- Owning impactful individual projects that move the company forward
- Working alongside a diverse and global team
- Two assigned mentors, with continuous feedback and rapid support
- Participation in our Employee Resource Groups (ERGs)
- Access to our FalconFit Wellness Programme and Employee Assistance Programme
- Fun Slack channels (e.g. food, gaming, sports, pets, etc.)
- Paid bank holidays and pension contributions