Intel Analyst IAC OSS (Remote) at CrowdStrike
About the Role:
CrowdStrike Intelligence, a core component of CrowdStrike, is seeking an Intelligence Analyst for its Global Threat Analysis Cell (GTAC) to focus on eCrime activity. This position will be primarily focused on analyzing threats and tracking of known adversaries, as well as emerging threats. The Analyst will be required to research and report on eCrime operations from both the strategic and tactical level. This position is instrumental in providing unique insight into finished Intelligence products used by CrowdStrike customers and stakeholders.
Essential Duties and Responsibilities
Identify cyber threats, trends, and new developments on various predetermined cyber security topics by analyzing raw intelligence and data which includes geopolitical and transnational events/issues
Identify and monitor the Tactics, Techniques, and Procedures (TTPs) used by cyber threat actors by analyzing raw intelligence and data
Apply understood analytic tradecraft to gathered intelligence in a consistent manner
Provide finished intelligence analysis to internal and external customers through written reporting, in varying predetermined suspense and depth, with minimal supervision
Collaborate across teams to inform various functions within CrowdStrike Intelligence about activity of interest and to coordinate adversary/campaign tracking
Identify intelligence gaps and submit requests for information to fill gaps
Respond to requests for information from internal and external customers as determined by priority
Conduct briefings as needed for a variety of levels of customers as requested (via either phone, video conference, webcast, in-person briefing, or industry conference)
Minimum of 3-4 years’ experience in threat intelligence
Motivated self-starter with a moderate-level of experience in eCrime cyber threat intelligence
Ability to produce quality finished intelligence products for short deadlines, as well as continuing to maintain analysis for and report on long term strategic assessments
Knowledge of or ability to learn how malware is developed, functions, and is employed with specific understanding of malware used in eCrime operations
Desire to extend knowledge on intelligence tradecraft-related and technical terminology relevant to eCrime operations
Ability and willingness to conduct in-depth analysis of the tools and tradecraft used by eCrime actors on a technical level
Ability and willingness to learn about financial systems and how they might be affected by eCrime operations.
Undergraduate degree or military training and experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc. Other technical security certifications or academic background a plus.