Remote Jobs

Cyber Threat Intelligence Analyst Internship (Summer 2025)


PayCompetitive
LocationRemote
Employment typeTemporary

What's your preference?

Apply with job updates
  • Job Description

      Req#: 71e234bc-e17d-48e6-91bb-45851569be88
      About Hunter Strategy

      Hunter Strategy has a unique philosophy to technical project delivery. We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions. Hunter Strategy was founded on the premise that IT is 21st century infrastructure - critically important but only instrumentally valuable. Accordingly, our teams look at problems with a single objective: the identification and enablement of the right capability to address the most vexing problems our Mission Partners face. We continue to support our partners' success by leveraging the right technology, with the right plan, and the right team to address tomorrow's challenges today.

      Summer 2025 Cyber Threat Intelligence Analyst Internship

      About the Opportunity

      Join our team for a 3-month remote internship focused on Cyber Threat Intelligence Operations. This internship provides hands-on experience in identifying, analyzing, and reporting on cyber threats, with dedicated one-on-one mentorship from industry professionals. You'll work on real-world threat intelligence projects while developing your analytical skills and understanding of the threat landscape.

      What We Offer

      Customized Experience: We match qualified interns with projects and teams based on their interests and skill sets

      Real-World Projects: Work on actual challenges and contribute meaningfully to your team

      Dedicated Mentorship: Receive one-on-one guidance from experienced analysts

      Full Team Integration: Experience what it's truly like to work here by becoming a valued team member

      What You'll Do

      -Monitor open-source intelligence (OSINT) feeds for relevant threat information

      -Collect and organize indicators of compromise (IOCs) from various sources

      -Learn to use threat intelligence platforms and tools

      -Track security bulletins, vulnerability announcements, and vendor advisories

      -Analyze threat data under the guidance of senior analysts

      -Map threat activities to frameworks such as MITRE ATT&CK

      -Research threat actors and their tactics, techniques, and procedures (TTPs)

      -Assist in creating threat intelligence reports and briefings

      -Participate in intelligence sharing discussions and team meetings

      Qualifications

      Technical Knowledge

      -Foundational understanding of cybersecurity concepts and principles

      -Basic knowledge of threat intelligence processes and methodologies

      -Familiarity with common cyber threats and attack vectors

      -Understanding of indicators of compromise (IOCs) and their significance

      -Awareness of threat intelligence sources and platforms

      -Interest in threat actor research and attribution

      Technical Skills

      -Working knowledge of at least one of the following: Bash, CMD, PowerShell

      -Basic research and analytical skills

      -Ability to organize and categorize information effectively

      -Familiarity with security frameworks like MITRE ATT&CK

      -Basic understanding of network protocols and security concepts

      Soft Skills

      -Strong critical thinking and problem-solving abilities

      -Excellent written and verbal communication skills

      -Attention to detail and analytical mindset

      -Self-motivated with intellectual curiosity

      -Ability to work both independently and as part of a team

      -Interest in translating technical findings into actionable information

      Program Details

      Duration: 12 weeks

      Location: Remote
  • About the company

      The best remote jobs for you