Cyber Threat Intelligence Analyst Intern

Hunter Strategy
Remote

About The Position

Join our team for a 3-month remote internship focused on Cyber Threat Intelligence Operations. This internship provides hands-on experience in identifying, analyzing, and reporting on cyber threats, with dedicated one-on-one mentorship from industry professionals. You'll work on real-world threat intelligence projects while developing your analytical skills and understanding of the threat landscape. What We Offer Customized Experience: We match qualified interns with projects and teams based on their interests and skill sets Real-World Projects: Work on actual challenges and contribute meaningfully to your team Dedicated Mentorship: Receive one-on-one guidance from experienced analysts Full Team Integration: Experience what it's truly like to work here by becoming a valued team member

Requirements

  • Foundational understanding of cybersecurity concepts and principles
  • Basic knowledge of threat intelligence processes and methodologies
  • Familiarity with common cyber threats and attack vectors
  • Understanding of indicators of compromise (IOCs) and their significance
  • Awareness of threat intelligence sources and platforms
  • Interest in threat actor research and attribution
  • Working knowledge of at least one of the following: Bash, CMD, PowerShell
  • Basic research and analytical skills
  • Ability to organize and categorize information effectively
  • Familiarity with security frameworks like MITRE ATT&CK
  • Basic understanding of network protocols and security concepts
  • Strong critical thinking and problem-solving abilities
  • Excellent written and verbal communication skills
  • Attention to detail and analytical mindset
  • Self-motivated with intellectual curiosity
  • Ability to work both independently and as part of a team
  • Interest in translating technical findings into actionable information

Responsibilities

  • Monitor open-source intelligence (OSINT) feeds for relevant threat information
  • Collect and organize indicators of compromise (IOCs) from various sources
  • Learn to use threat intelligence platforms and tools
  • Track security bulletins, vulnerability announcements, and vendor advisories
  • Analyze threat data under the guidance of senior analysts
  • Map threat activities to frameworks such as MITRE ATT&CK
  • Research threat actors and their tactics, techniques, and procedures (TTPs)
  • Assist in creating threat intelligence reports and briefings
  • Participate in intelligence sharing discussions and team meetings
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service