Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: Washington, DC
Career Level: Associate
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is seeking a motivated Cybersecurity Analyst Intern to support a critical U.S. government agency in the National Capital Region. This internship provides hands-on exposure to Security Operations Center (SOC) functions, including incident response, threat detection, and security monitoring across on-premises and cloud environments.

This role is designed for students or early-career professionals looking to build real-world cybersecurity experience while working alongside experienced analysts in a collaborative environment.

Key Responsibilities:

  • Assist in monitoring and reviewing security alerts using tools such as Splunk Enterprise Security and CrowdStrike Falcon under supervision.

  • Support analysis of suspicious or phishing-related emails using tools such as Cisco IronPort, VirusTotal, and other intelligence sources.

  • Perform initial triage of low-severity alerts and escalate findings to senior analysts following established procedures.

  • Assist with access review activities using CyberArk under guidance.

  • Help review, assign, and track cybersecurity tickets using ServiceNow and internal collaboration tools.

  • Support identification of indicators of compromise (IOCs) and document recommended mitigation actions for review by senior staff.

  • Contribute to SOC documentation efforts, including incident summaries and updates to response procedures.

  • Assist in reviewing Cybersecurity and Infrastructure Security Agency (CISA) advisories to assess potential impact.

  • Collaborate with SOC team members to support process improvements and operational efficiency.

  • Stay current with emerging threats and cybersecurity best practices.

Qualifications

Required:

  • Actively pursuing or recently completed a Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field.

  • Ability to obtain and maintain a Public Trust requiring U.S. Citizenship or Green Card status. 

  • Foundational understanding of cybersecurity concepts, including common attack types and basic incident response principles.

  • Familiarity with SIEM or EDR tools through coursework, labs, or personal projects.

  • Ability to analyze basic log data and follow documented processes.

  • Strong attention to detail, organization, and communication skills.

  • Ability to work effectively in a team-oriented environment.

Preferred Qualifications:

  • Coursework or lab experience in phishing analysis or incident response.

  • Exposure to threat intelligence tools such as VirusTotal or Mandiant resources.

  • Basic scripting knowledge (Python, PowerShell, or SQL).

  • Entry-level certifications such as CompTIA Security+ or Splunk Fundamentals.

 

Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.


 Apply on company website