Overview
We are seeking a motivated Cyber Threat Detection Engineer Intern to join our Security Operations team. In this role, you will collaborate with experienced security professionals to monitor, analyze, and respond to potential threats within our clients’ digital environments. This internship offers hands-on experience in security monitoring, threat hunting, incident analysis, and the operation of security tools—providing a strong foundation for a future career in cybersecurity.
Key Responsibilities:
- Monitor security alerts and events using our Security Information and Event Management (SIEM) platform
- Analyze log data to detect anomalies and potential security incidents
- Support threat hunting efforts to proactively identify indicators of compromise (IOCs)
- Assist in creating and refining detection rules, alerts, and use cases
- Document detection engineering rules, including technical reasoning, data sources, and testing procedures
- Maintain detailed records of security incidents, investigation steps, and remediation recommendations
- Contribute to the team's knowledge base on emerging threats and detection strategies
- Assist with automating routine monitoring tasks using scripting languages
- Participate in testing new detection techniques and evaluating security tools
- Collaborate with senior analysts during incident triage and response
- Support the development of regular security posture and threat landscape reports
Required Qualifications:
- Currently pursuing a Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field
- Basic understanding of network protocols and system architecture
- Familiarity with at least one programming or scripting language (e.g., Python, PowerShell, Bash)
- Strong grasp of core cybersecurity principles and common attack vectors
- Analytical mindset with solid problem-solving skills
- Strong written and verbal communication abilities
- Attention to detail and focus during routine monitoring tasks
- Eagerness to learn and adapt in a fast-paced, dynamic security environment
Preferred Qualifications:
- Coursework or personal projects in cybersecurity, network security, or digital forensics
- Basic experience with log analysis and security monitoring
- Exposure to SIEM platforms or other security tools
- Familiarity with the MITRE ATT&CK framework or similar threat modeling approaches
- Experience working with Linux/Unix operating systems
- Participation in capture-the-flag (CTF) events, cybersecurity competitions, or bug bounty programs
Program Details
Duration: 12 Weeks
Location: Remote