About Hunter Strategy
Hunter Strategy has a unique philosophy to technical project delivery. We treat all our customers like mission partners because they rely on our team to meet their objectives through complex software engineering, cloud operations, and cyber risk management solutions. Hunter Strategy was founded on the premise that IT is 21st century infrastructure - critically important but only instrumentally valuable. Accordingly, our teams look at problems with a single objective: the identification and enablement of the right capability to address the most vexing problems our Mission Partners face. We continue to support our partners' success by leveraging the right technology, with the right plan, and the right team to address tomorrow's challenges today.
Summer 2025 Cyber Threat Intelligence Analyst Internship
About the Opportunity
Join our team for a 3-month remote internship focused on Cyber Threat Intelligence Operations. This internship provides hands-on experience in identifying, analyzing, and reporting on cyber threats, with dedicated one-on-one mentorship from industry professionals. You'll work on real-world threat intelligence projects while developing your analytical skills and understanding of the threat landscape.
What We Offer
Customized Experience: We match qualified interns with projects and teams based on their interests and skill sets
Real-World Projects: Work on actual challenges and contribute meaningfully to your team
Dedicated Mentorship: Receive one-on-one guidance from experienced analysts
Full Team Integration: Experience what it's truly like to work here by becoming a valued team member
What You'll Do
-Monitor open-source intelligence (OSINT) feeds for relevant threat information
-Collect and organize indicators of compromise (IOCs) from various sources
-Learn to use threat intelligence platforms and tools
-Track security bulletins, vulnerability announcements, and vendor advisories
-Analyze threat data under the guidance of senior analysts
-Map threat activities to frameworks such as MITRE ATT&CK
-Research threat actors and their tactics, techniques, and procedures (TTPs)
-Assist in creating threat intelligence reports and briefings
-Participate in intelligence sharing discussions and team meetings
Qualifications
Technical Knowledge
-Foundational understanding of cybersecurity concepts and principles
-Basic knowledge of threat intelligence processes and methodologies
-Familiarity with common cyber threats and attack vectors
-Understanding of indicators of compromise (IOCs) and their significance
-Awareness of threat intelligence sources and platforms
-Interest in threat actor research and attribution
Technical Skills
-Working knowledge of at least one of the following: Bash, CMD, PowerShell
-Basic research and analytical skills
-Ability to organize and categorize information effectively
-Familiarity with security frameworks like MITRE ATT&CK
-Basic understanding of network protocols and security concepts
Soft Skills
-Strong critical thinking and problem-solving abilities
-Excellent written and verbal communication skills
-Attention to detail and analytical mindset
-Self-motivated with intellectual curiosity
-Ability to work both independently and as part of a team
-Interest in translating technical findings into actionable information
Program Details
Duration: 12 weeks
Location: Remote
Cyber Fusion Center
Remote (United States)
Share on: