$95K - 160K a year
The role involves identifying, researching, and tracking trends in the cloud threat landscape, focusing on cloud-related techniques used by adversaries. Analysts will collaborate with other experts to integrate data and develop finished intelligence products.
Candidates should have 2-3 years of experience in threat intelligence or cloud incident response, with skills in analyzing cloud logs and understanding IAM concepts. A desire to expand knowledge in cloud intelligence and relevant technical terminology is also essential.
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About the Role: CrowdStrike Intelligence, a core component of CrowdStrike, is seeking a motivated Intelligence Analyst with excellent analysis skills for the Global Threat Analysis Cell (GTAC) to identify, research and track trends associated with the cloud threat landscape. This role will be focused on tracking and documenting cloud-related techniques that are observed in the wild and their use by targeted intrusion and eCrime adversaries. It will involve close coordination with other subject matter experts within the Intelligence team and extensive collaboration to integrate data from other data sources. This position serves an important role in increasing our understanding of trends in the global cloud threat landscape, contributing to the continuous tracking of criminal and state-sponsored adversary groups, and ultimately developing finished intelligence products. The ideal candidate for this position is a specialist in AWS/Azure/GCP log analysis with the ability to track the adversary landscape based on intrusion behavior. We are also open to applications by experienced and talented analysts without significant knowledge in this field that are willing to rapidly expand their skills to meet the following requirements: What You'll Do: Identify threats, trends, and new developments in the cloud threat landscape by analyzing raw intelligence and data. This will involve querying Logscale and analyzing raw cloud logs including CloudTrail and Azure related logs Research new techniques for clustering and tracking cloud-conscious threat actors Identify and monitor the Tactics, Techniques, and Procedures (TTPs) employed by cyber threat actors that compromise cloud environments Apply understood analytic tradecraft to gathered intelligence in a consistent manner Provide and assist with finished intelligence analysis to internal and external customers through written reporting of varied depth on short deadlines, with minimal supervision Collaborate across teams to inform various functions within CrowdStrike Intelligence about activity of interest and to coordinate adversary/campaign tracking Identify intelligence gaps and submit requests for information to fill gaps Conduct briefings as needed for a variety of levels of customers as requested (via either phone, video conference, webcast, in-person briefing, or industry conference) What You'll Need: Minimum of 2-3 years’ experience in a threat intelligence environment or cloud-focused incident response Motivated self-starter with experience in the cyber threat intelligence field, preferably with experience in researching and reporting on cloud incidents in AWS, Azure, or GCP as well as adversary behavior Experience analyzing API logs (e.g. CloudTrail) from at least one of the three major cloud service providers: AWS, Azure, or GCP Basic understanding of identity and access management (IAM) concepts in the cloud Understanding of identity initial access and BEC techniques including AitM and password spraying Ability to identify and track adversary tradecraft trends Ability to produce quality finished intelligence products on short deadlines, as well as continuing to maintain analysis for and report on long term strategic assessments Basic knowledge of how malware is developed, functions, and is employed Desire to extend knowledge on intelligence tradecraft and technical terminology relevant to cloud intelligence, and provide assistance to other members of the intelligence team Undergraduate degree, military training or relevant experience in cyber intelligence, computer science, general intelligence studies, security studies, political science, international relations, etc. Other technical security certifications or academic background are a plus. #LI-Remote #LI-AO1 Benefits of Working at CrowdStrike: Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified™ across the globe CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance. Find out more about your rights as an applicant. CrowdStrike participates in the E-Verify program. Notice of E-Verify Participation Right to Work CrowdStrike, Inc. is committed to equal pay for equal work in its compensation practices. The base salary range for this position in the U.S. is $95,000 - $160,000 per year + variable/incentive compensation + equity + benefits. A candidate's salary is determined by various factors including, but not limited to, relevant work experience, skills, certifications, job level, supervisory status, and location. Expected Close Date of Job Posting is:10-07-2025 CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware. There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.
This job posting was last updated on 8/8/2025