Cyber Security Intern

Ridgeline InternationalTysons, VA
5d

About The Position

At Ridgeline, we are pioneers in the fight against Ubiquitous Technical Surveillance, helping government and enterprise organizations protect what matters most in a rapidly evolving digital landscape. We are a company built for people who thrive on curiosity, creativity, and solving challenges no one else has cracked yet. Our culture rewards initiative, values collaboration over ego, and gives you the freedom to experiment and innovate. We offer meaningful work, flexible remote options, a balanced work life rhythm, and a team of talented engineers and experts who support and inspire one another. Joining Ridgeline means contributing to technology that has real impact while growing your career in a place where your ideas and expertise genuinely matter. Job Description What You Will Do Monitor security tools and platforms to identify potential threats, suspicious behavior, and operational anomalies. Support vulnerability assessments and penetration testing activities while working closely with senior security staff. Maintain accurate and current documentation for security policies, procedures, and incident response plans. Research emerging cyber threats, evolving attack vectors, and industry best practices to inform security decisions. Ensure compliance requirements are automated and stored in a declarative format using Compliance as Code approach. Assist with hardening configurations in operational platforms by applying container security strategies and granular network segmentation policies. Support the team with log analysis, security reporting, and improvements to security tooling. What You Will Learn How cybersecurity teams defend against real world threats in a mission critical environment How security monitoring tools, SIEM platforms, and threat detection workflows operate in practice How to integrate security tooling and workflows into the software development and deployment process using modern CI and CD practices Strategies for securing discrete workloads in shared computing environments such as Kubernetes, Docker, and vCenter Best practices for using LLMs to support security engineering and security architecture

Requirements

  • Currently pursuing a bachelor or master’s degree in Cybersecurity, Computer Science, Information Technology, or a related field
  • Foundational understanding of networking concepts including TCP/IP, DNS, firewalls, and VPNs
  • Foundational understanding of DevSecOps tooling and concepts including CI and CD, DAST, SAST, and provenance
  • Strong analytical and problem-solving skills with keen attention to detail
  • Familiarity with automation and container orchestration platforms such as Ansible, Kubernetes, and vCenter
  • Ability to communicate technical concepts clearly in both written and verbal formats
  • Eagerness to learn and stay current with the evolving cybersecurity landscape

Nice To Haves

  • Hands-on experience with security tools such as SIEM platforms, vulnerability scanners, or endpoint detection solutions
  • Capture-the-Flag competition experience or personal projects showing practical knowledge of DevSecOps concepts
  • Capture-The-Flag competition experience
  • Experience with development tooling (Git) and scripting languages such as Python, Bash, or PowerShell
  • Familiarity with Infrastructure-as-Code concepts (Terraform, CloudFormation)
  • Familiarity with cloud security concepts (AWS, Azure, or GCP)
  • Familiarity with automation and container orchestration platforms (Ansible, Kubernetes, vCenter)

Responsibilities

  • Monitor security tools and platforms to identify potential threats, suspicious behavior, and operational anomalies.
  • Support vulnerability assessments and penetration testing activities while working closely with senior security staff.
  • Maintain accurate and current documentation for security policies, procedures, and incident response plans.
  • Research emerging cyber threats, evolving attack vectors, and industry best practices to inform security decisions.
  • Ensure compliance requirements are automated and stored in a declarative format using Compliance as Code approach.
  • Assist with hardening configurations in operational platforms by applying container security strategies and granular network segmentation policies.
  • Support the team with log analysis, security reporting, and improvements to security tooling.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service