Назад
Company hidden
1 день назад

Cybersecurity SOC Analyst Intern

3 253 - 4 404$
Формат работы
hybrid
Тип работы
fulltime
Грейд
trainee
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Cybersecurity SOC Analyst Intern (Cybersecurity): Monitoring, detecting, and responding to security events within a Security Operations Center with an accent on alert triage and incident investigation. Focus on analyzing phishing attempts, reviewing system logs, and contributing to active threat intelligence research.

Location: Hybrid; Springfield, IL

Salary: $18.80 - $25.43 per hour

Company

A financial services corporation dedicated to providing insurance and financial planning products tailored for educators.

What you will do

  • Monitor security alerts and events using SIEM and endpoint detection tools.
  • Triage, investigate, and document security alerts, escalating incidents when necessary.
  • Perform analysis of phishing emails and other suspicious activities.
  • Review logs from systems, networks, and applications to identify threats.
  • Participate in incident response activities and post-incident reviews.
  • Conduct threat intelligence research and contribute to process improvements.

Requirements

  • Currently pursuing or recently completed a degree in Cybersecurity, IT, Computer Science, or a related field.
  • Basic understanding of cybersecurity concepts such as phishing, malware, and network attacks.
  • Familiarity with Windows and Linux operating systems.
  • Strong analytical, problem-solving, and communication skills.
  • Must be able to work in a hybrid capacity in Springfield, IL.

Nice to have

  • Exposure to SIEM tools like Splunk, Rapid7 InsightIDR, or Elastic.
  • Familiarity with EDR tools such as SentinelOne or CrowdStrike.
  • Basic knowledge of networking (TCP/IP, DNS, HTTP).
  • Knowledge of security frameworks including MITRE ATT&CK and NIST.
  • Experience with scripting in Python or PowerShell.

Culture & Benefits

  • Direct mentorship from experienced cybersecurity analysts.
  • Hands-on exposure to enterprise-grade security tools and workflows.
  • Practical experience with the full incident response lifecycle.
  • Opportunity to contribute directly to active security operations in a corporate environment.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →