Cyber Threat Detection Engineer Intern (Summer 2025)
Remote (United States)
Hunter Strategy
About Hunter Strategy
Hunter Strategy has a unique philosophy to technical project delivery. We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions. Hunter Strategy was founded on the premise that IT is 21st century infrastructure - critically important but only instrumentally valuable. Accordingly, our teams look at problems with a single objective: the identification and enablement of the right capability to address the most vexing problems our Mission Partners face. We continue to support our partners' success by leveraging the right technology, with the right plan, and the right team to address tomorrow's challenges today.
Overview
We are seeking a motivated Cyber Threat Detection Engineer Intern to join our Security Operations team. In this role, you will collaborate with experienced security professionals to monitor, analyze, and respond to potential threats within our clients’ digital environments. This internship offers hands-on experience in security monitoring, threat hunting, incident analysis, and the operation of security tools—providing a strong foundation for a future career in cybersecurity.
Key Responsibilities:
- Monitor security alerts and events using our Security Information and Event Management (SIEM) platform
- Analyze log data to detect anomalies and potential security incidents
- Support threat hunting efforts to proactively identify indicators of compromise (IOCs)
- Assist in creating and refining detection rules, alerts, and use cases
- Document detection engineering rules, including technical reasoning, data sources, and testing procedures
- Maintain detailed records of security incidents, investigation steps, and remediation recommendations
- Contribute to the team's knowledge base on emerging threats and detection strategies
- Assist with automating routine monitoring tasks using scripting languages
- Participate in testing new detection techniques and evaluating security tools
- Collaborate with senior analysts during incident triage and response
- Support the development of regular security posture and threat landscape reports
Required Qualifications:
- Currently pursuing a Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field
- Basic understanding of network protocols and system architecture
- Familiarity with at least one programming or scripting language (e.g., Python, PowerShell, Bash)
- Strong grasp of core cybersecurity principles and common attack vectors
- Analytical mindset with solid problem-solving skills
- Strong written and verbal communication abilities
- Attention to detail and focus during routine monitoring tasks
- Eagerness to learn and adapt in a fast-paced, dynamic security environment
Preferred Qualifications:
- Coursework or personal projects in cybersecurity, network security, or digital forensics
- Basic experience with log analysis and security monitoring
- Exposure to SIEM platforms or other security tools
- Familiarity with the MITRE ATT&CK framework or similar threat modeling approaches
- Experience working with Linux/Unix operating systems
- Participation in capture-the-flag (CTF) events, cybersecurity competitions, or bug bounty programs
Program Details
Duration: 12 Weeks
Location: Remote
Tags: Bash Cloud Computer Science CTF Forensics Linux Log analysis MITRE ATT&CK Monitoring Network security PowerShell Python Risk management Scripting SIEM Strategy Threat detection UNIX
Perks/benefits: Career development Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.