Sr. Intelligence Analyst, Recon+ (remote, Gbr)

CrowdStrike CrowdStrike · Enterprise · United Kingdom · Remote

CrowdStrike is seeking a Sr. Intelligence Analyst for their Counter Adversary Operations (CAO) Elite team. This role focuses on protecting organizations from advanced attackers by providing threat intelligence, digital risk monitoring, and threat hunt findings. The analyst will serve as a trusted advisor to customers, research dark web data, deliver presentations, and respond to customer requests. The role requires experience in Cyber Threat Intelligence, Digital Risk Monitoring, and Third-party Risk Management, with a technical understanding of security across cloud environments. While the role mentions AI, machine learning, and autonomous agents as tools to enhance analysis, the core function is intelligence analysis and customer advisory, not direct AI/ML model development or deployment.

What you'd actually do

  1. Serve as a trusted advisor who maintains ownership of dedicated customer accounts, delivering outstanding experiences that build trust and facilitate high levels of satisfaction across all organizational levels.
  2. Research dark web data and tailor threat intelligence for CAO Elite customer based on their specific requirements and environment
  3. Prepare and deliver customer presentations relating to intelligence reports and dark web alerts on a regular basis
  4. Partner across CrowdStrike teams to develop and implement creative solutions that exceed customer expectations, focusing on delivering exceptional outcomes even when faced with complex challenges
  5. Respond to customer requests relating to threat intelligence, threat hunting, and dark web monitoring

Skills

Required

  • Cyber Threat Intelligence
  • Digital Risk Monitoring
  • Third-party Risk Management
  • Cyber threat intelligence tradecraft, terminology, lifecycle, and all-source analysis
  • Dark and deep web ecosystems, including threat actors, forums, leak sites, malware, and adversary TTPs
  • Collaborative work within a customer-focused team environment
  • Technical understanding of security across diverse cloud environments (production, development, isolated workspaces)
  • Enterprise SaaS platforms, their interconnected ecosystems, and unique security vulnerabilities
  • Executive-level and detailed technical findings communication
  • Presenting, briefing, and delivering reports to stakeholders
  • Problem-solving and creating customer solutions in a fast-paced environment
  • Independent operation with minimal direction
  • Managing multiple concurrent workstreams
  • Adaptability and willingness to learn new technologies

Nice to have

  • AI, machine learning, and autonomous agents can enhance threat intelligence analysis and customer outcomes

What the JD emphasized

  • 2+ years of specialized experience in the following domains: Cyber Threat Intelligence, Digital Risk Monitoring, Third-party Risk Management
  • Knowledge of cyber threat intelligence tradecraft, terminology, lifecycle, and all-source analysis
  • Familiarity with dark and deep web ecosystems, including threat actors, forums, leak sites, malware, and adversary TTPs
  • Curiosity about how AI, machine learning, and autonomous agents can enhance threat intelligence analysis and customer outcomes