Intelligence Analyst - Digital Risk Monitoring (remote)

CrowdStrike CrowdStrike · Enterprise · United States · Remote

This role focuses on cyber threat intelligence and digital risk monitoring, leveraging CrowdStrike's platform to protect customers from advanced attackers. The analyst will research dark web data, triage findings, provide expertise, and deliver presentations. While the role uses AI tools and explores their potential enhancement of threat intelligence, it does not involve building or shipping AI models.

What you'd actually do

  1. Research dark web data and tailor threat intelligence for CAO Elite customer based on their specific requirements and environment
  2. Rapidly triage and escalate noteworthy findings from Falcon Counter Adversary Recon
  3. Guide customers through Falcon Counter Adversary Recon findings and providing subject matter expertise
  4. Prepare and deliver customer presentations relating to intelligence reports and dark web alerts on a regular basis
  5. Partner across CrowdStrike teams to develop and implement creative solutions that exceed customer expectations, focusing on delivering exceptional outcomes even when faced with complex challenges

Skills

Required

  • Cyber Threat Intelligence
  • Digital Risk Monitoring
  • Third-party Risk Management
  • Cyber threat intelligence tradecraft, terminology, lifecycle, and all-source analysis
  • Dark and deep web ecosystems, including threat actors, forums, leak sites, malware, and adversary TTPs
  • Security across cloud environments (production, development, isolated workspaces)
  • Enterprise SaaS platforms, their interconnected ecosystems, and unique security vulnerabilities
  • Organizational skills
  • Communication skills (executive-level and detailed technical)
  • Presenting, briefing, and delivering reports to stakeholders
  • Problem-solving
  • Ability to operate independently with minimal direction
  • Managing multiple concurrent workstreams
  • Adaptability
  • Willingness to learn new technologies

Nice to have

  • Contemporary scripting languages
  • Application programming interfaces (API)

What the JD emphasized

  • 2+ years of specialized experience in the following domains: Cyber Threat Intelligence, Digital Risk Monitoring, Third-party Risk Management
  • Knowledge of cyber threat intelligence tradecraft, terminology, lifecycle, and all-source analysis
  • Familiarity with dark and deep web ecosystems, including threat actors, forums, leak sites, malware, and adversary TTPs
  • Technical understanding of security across cloud environments (production, development, isolated workspaces) with specific knowledge of enterprise SaaS platforms, their interconnected ecosystems, and unique security vulnerabilities
  • Curiosity about how AI, machine learning, and autonomous agents can enhance threat intelligence analysis and customer outcomes