Cyber Threat Intelligence Analyst Intern

Posted 15 Hours Ago
Be an Early Applicant
Hiring Remotely in United States
Remote
Internship
Cloud • Software • Cybersecurity
Get IT right.
The Role
Interns will gain hands-on experience in cyber threat intelligence by monitoring threat information, analyzing data, and participating in team discussions, under expert guidance.
Summary Generated by Built In

About Hunter Strategy

Hunter Strategy has a unique philosophy to technical project delivery. We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions. Hunter Strategy was founded on the premise that IT is 21st century infrastructure - critically important but only instrumentally valuable. Accordingly, our teams look at problems with a single objective: the identification and enablement of the right capability to address the most vexing problems our Mission Partners face. We continue to support our partners' success by leveraging the right technology, with the right plan, and the right team to address tomorrow's challenges today.


Cyber Threat Intelligence Analyst Internship


About the Opportunity

Join our team for a 3-month remote internship focused on Cyber Threat Intelligence Operations. This internship provides hands-on experience in identifying, analyzing, and reporting on cyber threats, with dedicated one-on-one mentorship from industry professionals. You'll work on real-world threat intelligence projects while developing your analytical skills and understanding of the threat landscape.


What We Offer

Customized Experience: We match qualified interns with projects and teams based on their interests and skill sets

Real-World Projects: Work on actual challenges and contribute meaningfully to your team

Dedicated Mentorship: Receive one-on-one guidance from experienced analysts

Full Team Integration: Experience what it's truly like to work here by becoming a valued team member

 

What You'll Do

-Monitor open-source intelligence (OSINT) feeds for relevant threat information

-Collect and organize indicators of compromise (IOCs) from various sources

-Learn to use threat intelligence platforms and tools

-Track security bulletins, vulnerability announcements, and vendor advisories

-Analyze threat data under the guidance of senior analysts

-Map threat activities to frameworks such as MITRE ATT&CK

-Research threat actors and their tactics, techniques, and procedures (TTPs)

-Assist in creating threat intelligence reports and briefings

-Participate in intelligence sharing discussions and team meetings

 

Qualifications

Technical Knowledge

-Foundational understanding of cybersecurity concepts and principles

-Basic knowledge of threat intelligence processes and methodologies

-Familiarity with common cyber threats and attack vectors

-Understanding of indicators of compromise (IOCs) and their significance

-Awareness of threat intelligence sources and platforms

-Interest in threat actor research and attribution

 

Technical Skills

-Working knowledge of at least one of the following: Bash, CMD, PowerShell

-Basic research and analytical skills

-Ability to organize and categorize information effectively

-Familiarity with security frameworks like MITRE ATT&CK

-Basic understanding of network protocols and security concepts

 

Soft Skills

-Strong critical thinking and problem-solving abilities

-Excellent written and verbal communication skills

-Attention to detail and analytical mindset

-Self-motivated with intellectual curiosity

-Ability to work both independently and as part of a team

-Interest in translating technical findings into actionable information

 

Program Details

Duration: 12 weeks

Location: Remote

 

Top Skills

Bash
Cmd
Powershell
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Pompano Beach, Florida
91 Employees
Year Founded: 2015

What We Do

<​About_US> Cybersecurity and software engineering SMEs that help Government and Commercial customers build secure scalable solutions. <​Goal> Treat every customer like our partner. Build an environment of mutual success with all our partners. <​Solutions> Cyber Fusion Center/Managed Security Services, DevSecOps, Pen Test, CISO-AAS, AngularJS, ReactJS, NodeJS, Java, Spring, MongoDB, Postgres.... Too many to list and we are known to throw in a few fakes to see who is paying attention.

Similar Jobs

Golden Hippo Logo Golden Hippo

Paid Ads Specialist

Digital Media • eCommerce • Information Technology • Marketing Tech • Retail • Social Media • Analytics
Remote or Hybrid
2 Locations
500 Employees
72K-90K Annually

Golden Hippo Logo Golden Hippo

Sales Manager

Digital Media • eCommerce • Information Technology • Marketing Tech • Retail • Social Media • Analytics
Remote or Hybrid
Northern California, CA, USA
500 Employees
78K-104K Annually

Zscaler Logo Zscaler

Account Executive

Cloud • Information Technology • Security • Software • Cybersecurity
Easy Apply
Remote or Hybrid
California, USA
8697 Employees
90K-129K Annually

Dandy Logo Dandy

Staff Software Engineer

Computer Vision • Healthtech • Information Technology • Logistics • Machine Learning • Software • Manufacturing
Remote
USA
1800 Employees
228K-285K Annually

Similar Companies Hiring

Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees
Fairly Even Thumbnail
Software • Sales • Robotics • Other • Hospitality • Hardware
New York, NY
Kepler  Thumbnail
Fintech • Software
New York, New York
6 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account