Intelligence Analyst - Falcon Recon (remote)

CrowdStrike CrowdStrike · Enterprise · United States · Remote

This role is for an Intelligence Analyst on the Falcon Recon team at CrowdStrike, focusing on customer support and product enablement for their cyber threat intelligence product. The analyst will manage customer relationships, triage findings, provide expertise on the dark and deep web ecosystem, and act as a liaison between customers and the Intelligence/Engineering teams. The role requires experience in cyber threat intelligence, strong communication skills, and a customer service attitude.

What you'd actually do

  1. Drive high levels of customer satisfaction, maintaining a strong sense of ownership over many customer relationships.
  2. Quickly triage and escalate noteworthy findings from Falcon Intelligence Recon to the respective customers
  3. Understand the dark and deep web ecosystem; be able to properly convey analytical findings to customers
  4. Guide customers through Falcon Intelligence Recon findings and providing subject matter expertise
  5. Deliver regular written and verbal updates on relevant findings to customers, aligning with their preferred cadence.

Skills

Required

  • 3+ Years experience in cyber threat intelligence, all-source threat intelligence analysis, or intelligence collections and be fully versed in the intelligence lifecycle
  • Excellent written, verbal communication skills in English.
  • Working knowledge of cyber threat intelligence terminology, key concepts, dark & deep web ecosystems to include actors, forums, and leak sites
  • Adaptability and willingness to learn new technologies
  • Customer service attitude and willingness to help and problem-solve with customers
  • High degree of emotional intelligence and professional presence, as the role requires presenting potentially concerning findings to customers
  • Ability to operate independently and with little direction.
  • Demonstrated ability to document technical process and convey business terms in clear language.
  • Ability to present and explain technology to people with less technical knowledge
  • Attention to detail, but with an ability to understand the big picture view and understand when projects or efforts have conflicting objectives
  • Must be able to successfully manage time and deliverables for rapid service engagement customers
  • Must be able to thrive in a fast paced, high stress environment and able to create customer solutions with limited resources
  • Knowledge of data communication concepts and technologies, specifically email, networking, and enterprise security

Nice to have

  • Understanding of contemporary scripting languages such as python, and familiarity with application programming interfaces (API) as a delivery method for indicators and intelligence.
  • Experience with typosquatting, including: understanding domain names used for impersonation or phishing attacks

What the JD emphasized

  • 3+ Years experience in cyber threat intelligence, all-source threat intelligence analysis, or intelligence collections and be fully versed in the intelligence lifecycle
  • Working knowledge of cyber threat intelligence terminology, key concepts, dark & deep web ecosystems to include actors, forums, and leak sites
  • Must be able to successfully manage time and deliverables for rapid service engagement customers
  • Must be able to thrive in a fast paced, high stress environment and able to create customer solutions with limited resources