Cyber Analyst Intern – Summer 2026

General Dynamics Mission SystemsScottsdale, AZ
14h$23 - $25Hybrid

About The Position

We are seeking a motivated Cybersecurity Intern to join our Security Operations Center (SOC) team. This role is ideal for students or recent graduates with foundational cybersecurity knowledge and a strong interest in AI and automation technologies . The intern will assist with monitoring, analysis, and incident response activities while gaining hands-on experience with modern security tools and processes.

Requirements

  • Candidates should demonstrate a thorough understanding of cybersecurity principles.
  • Interns must be enrolled in an accredited degree program with a preference in a related field such as Cybersecurity or similar degerees. (e.g., Information Assurance, Information Security, Systems Engineering (with cybersecurity emphasis))
  • Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information.
  • Due to the nature of work performed within our facilities, U.S. citizenship is required.
  • Cybersecurity or Cybersecurity focus
  • Understanding of network protocols, system logs, and security alerts
  • Strong problem-solving and critical-thinking abilities
  • Ability to prepare clear and concise reports and documentation
  • Ability to handle sensitive information with confidentiality and discretion
  • Quick learner who can handle complex assignments
  • Shows initiative and executes projects professionally with minimal direction
  • Familiarity with automation tools or scripting languages (e.g., Python, PowerShell ) for SOC tasks
  • Willingness to stay updated with the latest security technologies, automation frameworks, and best practices

Nice To Haves

  • Coursework or academic projects in cybersecurity, AI, or automation
  • Exposure to penetration testing frameworks or vulnerability scanning tools
  • Participation in cybersecurity competitions, labs, or hands-on exercises
  • Knowledge of SIEM tools
  • Basic understanding of AI concepts (machine learning, anomaly detection, predictive analytics)
  • Ability to analyze logs and data from various sources to identify anomalies
  • Basic understanding of incident response procedures
  • Awareness of AI-driven security solutions and their role in modern cybersecurity operations
  • Awareness of current threat landscape and emerging security trends

Responsibilities

  • Analyze logs, network traffic, and other data sources to identify potential security incidents
  • Assist in ensuring adherence to regulatory and compliance requirements
  • Monitor user behavior to detect suspicious patterns
  • Help identify and implement AI-driven security tools for threat detection and anomaly identification
  • Conduct investigations into potential insider threats
  • Collaborate with other teams to gather information and evidence
  • Support automation of routine SOC tasks using scripts or basic automation tools
  • Assist in the response to security incidents, including initial triage and escalation
  • Document and report findings from security incidents and investigations
  • Participate in testing and validating machine learning models used in security analytics
  • Stay updated with the latest threat intelligence and security trends
  • Work closely with SOC team members and other departments
  • Contribute to the development and improvement of processes and procedures
  • Help document AI/automation workflows and provide feedback for improvement
  • Assist in the management and tuning of security monitoring tools and technologies
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service