Cybersecurity Analyst Intern

$44,850 - $81,075/Yr

Leidos - Joint Base Pearl Harbor-Hickam, HI

posted about 2 months ago

Full-time - Intern
Joint Base Pearl Harbor-Hickam, HI
Professional, Scientific, and Technical Services

About the position

The Digital Modernization Group at Leidos is seeking a Cybersecurity Analyst Intern to join the Global Solutions Management - Operations II (GSM-O II) contract. This contract is focused on the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense Information System Network (DISN) within the Department of Defense Information Network (DODIN), supporting the Defense Information Systems Agency (DISA). The position is based on-site at Ford Island, Hawaii, and requires a commitment to providing cybersecurity support in a collaborative environment. As a Cybersecurity Analyst Intern, you will be involved in various aspects of cybersecurity, including performing cyber threat intelligence analysis, correlating actionable security events, and conducting network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor outputs. You will also participate in incident response efforts, coordinating resources to address security incidents effectively. This role is ideal for highly motivated candidates who are eager to learn and contribute to the cybersecurity field. The intern will be expected to review Department of Defense (DoD) and open-source intelligence for potential threats, identify Indicators of Compromise (IOCs), and integrate these into sensors and Security Information and Event Management (SIEM) systems. You will utilize alerts from various sources, including endpoints and custom sensors, to identify compromises on customer networks and endpoints. The ability to articulate findings and create complex technical reports on analytic findings is essential for this role.

Responsibilities

  • Perform cyber threat intelligence analysis.
  • Correlate actionable security events.
  • Conduct network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor outputs.
  • Participate in the coordination of resources during incident response efforts.
  • Review DoD and open-source intelligence for threats.
  • Identify Indicators of Compromise (IOCs) and integrate those into sensors and SIEMs.
  • Utilize alerts from endpoints, IDS/IPS, Netflow, and custom sensors to identify compromises on customer networks/endpoints.
  • Review log files, pivot between data sets, and correlate evidence for incident investigations.
  • Articulate findings, updates, and analysis clearly.
  • Create complex technical reports on analytic findings.

Requirements

  • Current enrollment in an Associate's, Bachelor's or Master's program in Cybersecurity or related discipline is required.
  • Excellent written/verbal skills with the ability to interpret and author well-formed documents.
  • Demonstrated commitment to training, self-study, and maintaining proficiency in the technical cybersecurity domain.
  • Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
  • Understanding of Anti-Virus, HIPS, IDS/IPS, Full Packet Capture, Host-Based Forensics, Network Forensics.
  • Familiarity or knowledge of malware analysis concepts and methods.
  • Familiarity or knowledge of Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
  • Ability to obtain a Secret clearance is required to start (selected candidates will be sponsored for required clearance).
  • Must be a US Citizen to qualify.
  • Candidates must not have graduated prior to May 2025 and must be actively enrolled in a degree plan that extends into fall 2025.

Nice-to-haves

  • Security+ and/or CySA+ certifications.
  • Academic knowledge of CND domains (Protect, Detect, Respond and Sustain).
  • Understanding of Computer Incident Response organizations or Security Operations Centers.
  • Familiarity with an enterprise SIEM platform like Splunk or Elastic.
  • Unix/Linux command line experience.
  • Detail oriented.
  • Scripting and programming experience.
  • Highly engaged and willing/able to collaborate with other analysts.
  • Emotional Intelligence.

Benefits

  • Internship experience in a leading defense and technology company.
  • Opportunity to work on significant cybersecurity projects.
  • Mentorship from experienced cybersecurity professionals.
  • Potential for future employment opportunities after graduation.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service