SOC Intern

Kraft & Kennedy
Remote

About The Position

Kraft Kennedy is a multidisciplinary consulting firm with expertise in technology and management consulting, technology strategies, application specialties, technology infrastructure, managed services and proactive support. Combining this knowledge, our focused teams are dedicated to meeting the needs of our clients. With over 30 years’ experience we have learned that the key to successful IT is to focus as much on the business needs of the client as on technology. The Security Operations Center (SOC) is responsible for monitoring, triaging, and responding to security events across a diverse set of client environments. This team operates in a fast-paced, highly collaborative environment focused on identifying threats, analyzing alerts, and supporting incident response activities. This position is an entry-level, part-time paid internship designed for students interested in cybersecurity and security operations. You will be required to work security-related tickets, support alert triage activities, follow established SOC workflows, and assist senior analysts with investigation and response tasks. The role provides exposure to real-world security operations, tooling, and processes used in managed security services.

Requirements

  • Rising junior or senior in college
  • Strong interest in cybersecurity, information security, or related technical fields
  • Related major such as Computer Science, Information Systems, Cybersecurity, or similar preferred
  • Excellent verbal and written communication skills
  • Highly organized and detail oriented, with strong documentation habits
  • Demonstrated problem-solving and analytical thinking skills
  • Basic understanding of security concepts such as phishing, malware, authentication, and access controls preferred
  • Some exposure to Windows operating systems or enterprise environments preferred
  • Coursework, labs, or personal projects related to security or networking are a plus

Responsibilities

  • Learn client environments and the security tools used to protect them
  • Monitor, review, and triage security alerts and incidents under the guidance of senior SOC analysts
  • Work with cloud and on-premise security technologies commonly used in enterprise and legal-industry environments
  • Assist with investigation of security events such as phishing, malware detections, suspicious logins, and policy violations
  • Document findings, actions taken, and next steps clearly within the ticketing system
  • Escalate security events appropriately based on defined SOC procedures
  • Follow established incident handling, alert triage, and communication workflows
  • Participate in SOC knowledge sharing, training sessions, and team handoffs as required
  • Maintain awareness of common threat types, attacker techniques, and defensive controls
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service