Cyber Threat Detection Engineer Intern (Summer 2025)

  1. Home
  2. Remote jobs
  3. Architecture
  • Company hunterstrategy
  • Employment Contract
  • Location 🇺🇸 United States nationwide
  • Submitted Posted 1 day ago - Updated 6 hours ago


Overview
We are seeking a motivated Cyber Threat Detection Engineer Intern to join our Security Operations team. In this role, you will collaborate with experienced security professionals to monitor, analyze, and respond to potential threats within our clients’ digital environments. This internship offers hands-on experience in security monitoring, threat hunting, incident analysis, and the operation of security tools—providing a strong foundation for a future career in cybersecurity.


Key Responsibilities:

  • Monitor security alerts and events using our Security Information and Event Management (SIEM) platform
  • Analyze log data to detect anomalies and potential security incidents
  • Support threat hunting efforts to proactively identify indicators of compromise (IOCs)
  • Assist in creating and refining detection rules, alerts, and use cases
  • Document detection engineering rules, including technical reasoning, data sources, and testing procedures
  • Maintain detailed records of security incidents, investigation steps, and remediation recommendations
  • Contribute to the team's knowledge base on emerging threats and detection strategies
  • Assist with automating routine monitoring tasks using scripting languages
  • Participate in testing new detection techniques and evaluating security tools
  • Collaborate with senior analysts during incident triage and response
  • Support the development of regular security posture and threat landscape reports

Required Qualifications:

  • Currently pursuing a Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field
  • Basic understanding of network protocols and system architecture
  • Familiarity with at least one programming or scripting language (e.g., Python, PowerShell, Bash)
  • Strong grasp of core cybersecurity principles and common attack vectors
  • Analytical mindset with solid problem-solving skills
  • Strong written and verbal communication abilities
  • Attention to detail and focus during routine monitoring tasks
  • Eagerness to learn and adapt in a fast-paced, dynamic security environment

Preferred Qualifications:

  • Coursework or personal projects in cybersecurity, network security, or digital forensics
  • Basic experience with log analysis and security monitoring
  • Exposure to SIEM platforms or other security tools
  • Familiarity with the MITRE ATT&CK framework or similar threat modeling approaches
  • Experience working with Linux/Unix operating systems
  • Participation in capture-the-flag (CTF) events, cybersecurity competitions, or bug bounty programs

Program Details

Duration: 12 Weeks

Location: Remote

 


Loading similar jobs...

USA Remote Jobs

Discover fully remote job opportunities in the United States at USA Remote Jobs. Apply for roles like Software Developer, Customer Service Specialist, Project Manager, and more!

© 2025 Created by USA Remote Jobs. All rights reserved.