Currently tracking 27 active AI roles, up 13% versus the prior 4 weeks. Primary focus: Agent · Engineering. Salary range $160k–$370k (avg $264k).
| Title | Stage | AI score |
|---|---|---|
| Principal Algorithms Researcher (Remote) CrowdStrike is seeking a Principal Algorithms Researcher to invent new AI/ML algorithms and learning methods for cybersecurity problems, scaling them to petabytes of data. The role involves working at the intersection of AI and Threat Research, understanding analyst workflows, and defining research challenges. The ideal candidate will have expertise in building AI and agentic systems, driving data science projects, and a PhD or equivalent experience. The role primarily focuses on data (L0) but also involves building agentic systems (L4). | DataAgent | 9 |
| Sr. Security Researcher, TAC TBNA (Remote) This role focuses on researching nation-state adversary operations and targeted intrusions by performing malware reverse engineering, developing automation tools for analysis and tracking, and creating signatures for threat detection. The goal is to produce actionable intelligence reports and enhance understanding of malicious tools and malware. |
| Data |
| 7 |
| Engineer III - Data Software Engineer role focused on developing data classification engines and extracting insights using ML algorithms within CrowdStrike's cybersecurity platform. This role involves research, design, development, and implementation of data classification systems, with a strong emphasis on big data and ML. | Data | 7 |
| Intelligence Intern - Applied Research Cell (Remote) Internship role focused on applied research in cybersecurity, involving open-source research, malware analysis, and tool development for malware processing pipelines. The role is part of the Applied Research Cell (ARC) team, which bridges software engineering, malware analysis, and cyber threat intelligence. | Data | 5 |
| Intelligence Intern - ART Internship role focused on developing automated solutions for data collection, processing, and analysis in cybersecurity, operating honeypots, and performing vulnerability research. The role involves collaborating with other teams to satisfy technical collection requirements and inform on information security topics. | Data | 5 |