Cybersecurity Analyst Intern

  • SAIC
  • DC
  • Apr 22, 2026

Job Description

Description
SAIC is seeking a motivated Cybersecurity Analyst Intern to support a critical U.S. government agency in the National Capital Region. This internship provides hands-on exposure to Security Operations Center (SOC) functions, including incident response, threat detection, and security monitoring across on-premises and cloud environments.
This role is designed for students or early-career professionals looking to build real-world cybersecurity experience while working alongside experienced analysts in a collaborative environment.
Key Responsibilities:
  • Assist in monitoring and reviewing security alerts using tools such as Splunk Enterprise Security and CrowdStrike Falcon under supervision.
  • Support analysis of suspicious or phishing-related emails using tools such as Cisco IronPort, VirusTotal, and other intelligence sources.
  • Perform initial triage of low-severity alerts and escalate findings to senior analysts following established procedures.
  • Assist with access review activities using CyberArk under guidance.
  • Help review, assign, and track cybersecurity tickets using ServiceNow and internal collaboration tools.
  • Support identification of indicators of compromise (IOCs) and document recommended mitigation actions for review by senior staff.
  • Contribute to SOC documentation efforts, including incident summaries and updates to response procedures.
  • Assist in reviewing Cybersecurity and Infrastructure Security Agency (CISA) advisories to assess potential impact.
  • Collaborate with SOC team members to support process improvements and operational efficiency.
  • Stay current with emerging threats and cybersecurity best practices.

Qualifications
Required:
  • Actively pursuing or recently completed a Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field.
  • Ability to obtain and maintain a Public Trust requiring U.S. Citizenship or Green Card status.
  • Foundational understanding of cybersecurity concepts, including common attack types and basic incident response principles.
  • Familiarity with SIEM or EDR tools through coursework, labs, or personal projects.
  • Ability to analyze basic log data and follow documented processes.
  • Strong attention to detail, organization, and communication skills.
  • Ability to work effectively in a team-oriented environment.
Preferred Qualifications:
  • Coursework or lab experience in phishing analysis or incident response.
  • Exposure to threat intelligence tools such as VirusTotal or Mandiant resources.
  • Basic scripting knowledge (Python, PowerShell, or SQL).
  • Entry-level certifications such as CompTIA Security+ or Splunk Fundamentals.


Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.