Recently opened
Recently opened

#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a fanatical commitment to the customer to join us in shaping the future of cybersecurity.

Consistently recognized as a top workplace, CrowdStrike is committed to cultivating an inclusive, remote-first culture that offers people the autonomy and flexibility to balance the needs of work and life while taking their career to the next level. Interested in working for a company that sets the standard and leads with integrity? Join us on a mission that matters - one team, one fight.

About the role

This is a 12 week internship starting on Monday 2nd June 2025 and completing on Friday 22nd August. The Intelligence Analyst Internship is fully remote and requires no travel. Your work location is the city/town/province you will be working from remotely. Interns are also invited to work out of the CrowdStrike office located closest to their remote location.

What youll do

The team you are applying to – the Applied Research Cell (ARC) — lives at the intersection between software engineering, malware analysis, and cyber threat intelligence connecting the two worlds of reverse engineering and forward engineering. To that extent we are working closely with different teams from the wider mission with the end-goal of tracking the most advanced threat actors and ultimately stopping breaches.

ARC Interns will be assisted during the development of projects with well-defined deadlines.

The goal is to approach the following topics:

  • Conducting and evaluating open source research on cyber threats.
  • Learning cyber security concepts and threat actor Tactics, Techniques and Procedures (TTPs).
  • Conducting research on predetermined malware families and learning about various triage techniques.
  • Developing tools and integrating them to high-scale malware processing pipelines.

The internship will be scoped in a project to be completed during 12 weeks.

What youll need

  • Currently completing your penultimate year of University (2026 graduate) and be working towards a BA or BS / MA or MS degree in Computer Science, Computer Engineering, Math, Information Security, Information Assurance, Information Security Management, Intelligence Studies, Cybersecurity, Cybersecurity Policy, or a related field.
  • An eagerness to learn through hands-on experience and collaborative projects specific to your internship field.
  • Although CrowdStrike is a primarily remote company, collaboration is intrinsic to the success of our mission. Therefore, the strongest applicants will be those who can communicate effectively and frequently, and work well with fellow interns and employees.
  • Experience in malware research.
  • Experience with programming (Python, C or similar languages).

Bonus points

  • Having an investigative mindset and desire to stop evil.
  • Self motivated and actively seeking opportunities for growth.
  • Desire to rapidly increase skill set.
  • Crave new and innovative work.

CrowdStrike is proud to be an equal opportunity and affirmative action employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. Our approach to cultivating a diverse, equitable, and inclusive culture is rooted in listening, learning and collective action. By embracing the diversity of our people, we achieve our best work and fuel innovation - generating the best possible outcomes for our customers and the communities they serve.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.