About the Role:
Help us protect CrowdStrike and its customers from the most advanced threats! CrowdStrike’s Machine Learning Operations, Response and Evaluation works with the Malware Research Center on adversarial emulation to improve detections by CrowdStrike’s products.
What You’ll Do:
As a Machine Learning Operations, Response and Evaluation intern, you will assist in building tools and performing activities related to various aspects of security including, but not limited to: tactics and techniques, adversarial emulation, machine learning modules, detection improvements, clustering, etc. * * Get exposure to adversarial emulation work such as kill-chains, adversary techniques, etc. * * Review Machine Learning predictions * * Analyze data * * Identifying detection gaps and in guiding detection innovation * * Reverse engineer binaries of different types
What You'll Need:
- Pursuing an Undergraduate (in third or final year) Degree or Masters within a relevant field/degree subject area
- Passionate about cyber security, malware analysis and reverse engineering
- Interest in understanding exploitation tradecraft and actor tactics, techniques and procedures (TTPs)
- Have some knowledge/experience on Machine Learning/Artificial Intelligence
- Interest and/or experience in threat hunting
- Highly organized
Bonus Points:
- You have experience with C++, GoLang , Win32 APIs, Python, Bash, PowerShell
- If you have experience in using a post-exploitation framework (for example Metasploit)
- Splunk or SIEM knowledge
- MITRE ATT&CK Framework knowledge