Cyber Threat Intelligence Analyst Internship (Summer 2025)

About Hunter Strategy

Hunter Strategy has a unique philosophy to technical project delivery. We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions. Hunter Strategy was founded on the premise that IT is 21st century infrastructure - critically important but only instrumentally valuable. Accordingly, our teams look at problems with a single objective: the identification and enablement of the right capability to address the most vexing problems our Mission Partners face. We continue to support our partners' success by leveraging the right technology, with the right plan, and the right team to address tomorrow's challenges today.


Summer 2025 Cyber Threat Intelligence Analyst Internship


About the Opportunity

Join our team for a 3-month remote internship focused on Cyber Threat Intelligence Operations. This internship provides hands-on experience in identifying, analyzing, and reporting on cyber threats, with dedicated one-on-one mentorship from industry professionals. You'll work on real-world threat intelligence projects while developing your analytical skills and understanding of the threat landscape.


What We Offer

Customized Experience: We match qualified interns with projects and teams based on their interests and skill sets

Real-World Projects: Work on actual challenges and contribute meaningfully to your team

Dedicated Mentorship: Receive one-on-one guidance from experienced analysts

Full Team Integration: Experience what it's truly like to work here by becoming a valued team member

 

What You'll Do

-Monitor open-source intelligence (OSINT) feeds for relevant threat information

-Collect and organize indicators of compromise (IOCs) from various sources

-Learn to use threat intelligence platforms and tools

-Track security bulletins, vulnerability announcements, and vendor advisories

-Analyze threat data under the guidance of senior analysts

-Map threat activities to frameworks such as MITRE ATT&CK

-Research threat actors and their tactics, techniques, and procedures (TTPs)

-Assist in creating threat intelligence reports and briefings

-Participate in intelligence sharing discussions and team meetings

 

Qualifications

Technical Knowledge

-Foundational understanding of cybersecurity concepts and principles

-Basic knowledge of threat intelligence processes and methodologies

-Familiarity with common cyber threats and attack vectors

-Understanding of indicators of compromise (IOCs) and their significance

-Awareness of threat intelligence sources and platforms

-Interest in threat actor research and attribution

 

Technical Skills

-Working knowledge of at least one of the following: Bash, CMD, PowerShell

-Basic research and analytical skills

-Ability to organize and categorize information effectively

-Familiarity with security frameworks like MITRE ATT&CK

-Basic understanding of network protocols and security concepts

 

Soft Skills

-Strong critical thinking and problem-solving abilities

-Excellent written and verbal communication skills

-Attention to detail and analytical mindset

-Self-motivated with intellectual curiosity

-Ability to work both independently and as part of a team

-Interest in translating technical findings into actionable information

 

Program Details

Duration: 12 weeks

Location: Remote

Cyber Fusion Center

Remote (United States)

Share on:

Terms of servicePrivacyCookiesPowered by Rippling