Description
Description
SAIC is seeking a motivated Cybersecurity Analyst Intern to support a critical U.S. government agency in the National Capital Region. This internship provides hands-on exposure to Security Operations Center (SOC) functions, including incident response, threat detection, and security monitoring across on-premises and cloud environments.
This role is designed for students or early-career professionals looking to build real-world cybersecurity experience while working alongside experienced analysts in a collaborative environment.
Key Responsibilities:
-
Assist in monitoring and reviewing security alerts using tools such as Splunk Enterprise Security and CrowdStrike Falcon under supervision.
-
Support analysis of suspicious or phishing-related emails using tools such as Cisco IronPort, VirusTotal, and other intelligence sources.
-
Perform initial triage of low-severity alerts and escalate findings to senior analysts following established procedures.
-
Assist with access review activities using CyberArk under guidance.
-
Help review, assign, and track cybersecurity tickets using ServiceNow and internal collaboration tools.
-
Support identification of indicators of compromise (IOCs) and document recommended mitigation actions for review by senior staff.
-
Contribute to SOC documentation efforts, including incident summaries and updates to response procedures.
-
Assist in reviewing Cybersecurity and Infrastructure Security Agency (CISA) advisories to assess potential impact.
-
Collaborate with SOC team members to support process improvements and operational efficiency.
-
Stay current with emerging threats and cybersecurity best practices.
Qualifications
Required:
Actively pursuing or recently completed a Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field.
Ability to obtain and maintain a Public Trust requiring U.S. Citizenship or Green Card status.
Foundational understanding of cybersecurity concepts, including common attack types and basic incident response principles.
Familiarity with SIEM or EDR tools through coursework, labs, or personal projects.
Ability to analyze basic log data and follow documented processes.
Strong attention to detail, organization, and communication skills.
Ability to work effectively in a team-oriented environment.
Preferred Qualifications:
Coursework or lab experience in phishing analysis or incident response.
Exposure to threat intelligence tools such as VirusTotal or Mandiant resources.
Basic scripting knowledge (Python, PowerShell, or SQL).
Entry-level certifications such as CompTIA Security+ or Splunk Fundamentals.
Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
Apply on company website