Job Information
SAIC Cybersecurity Analyst Intern in Washington, District Of Columbia
Description
SAIC is seeking a motivated Cybersecurity Analyst Intern to support a critical U.S. government agency in the National Capital Region. This internship provides hands-on exposure to Security Operations Center (SOC) functions, including incident response, threat detection, and security monitoring across on-premises and cloud environments.
This role is designed for students or early-career professionals looking to build real-world cybersecurity experience while working alongside experienced analysts in a collaborative environment.
Key Responsibilities:
Assist in monitoring and reviewing security alerts using tools such as Splunk Enterprise Security and CrowdStrike Falcon under supervision.
Support analysis of suspicious or phishing-related emails using tools such as Cisco IronPort, VirusTotal, and other intelligence sources.
Perform initial triage of low-severity alerts and escalate findings to senior analysts following established procedures.
Assist with access review activities using CyberArk under guidance.
Help review, assign, and track cybersecurity tickets using ServiceNow and internal collaboration tools.
Support identification of indicators of compromise (IOCs) and document recommended mitigation actions for review by senior staff.
Contribute to SOC documentation efforts, including incident summaries and updates to response procedures.
Assist in reviewing Cybersecurity and Infrastructure Security Agency (CISA) advisories to assess potential impact.
Collaborate with SOC team members to support process improvements and operational efficiency.
Stay current with emerging threats and cybersecurity best practices.
Qualifications
Required:
Actively pursuing or recently completed a Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field.
Ability to obtain and maintain a Public Trust requiring U.S. Citizenship or Green Card status.
Foundational understanding of cybersecurity concepts, including common attack types and basic incident response principles.
Familiarity with SIEM or EDR tools through coursework, labs, or personal projects.
Ability to analyze basic log data and follow documented processes.
Strong attention to detail, organization, and communication skills.
Ability to work effectively in a team-oriented environment.
Preferred Qualifications:
Coursework or lab experience in phishing analysis or incident response.
Exposure to threat intelligence tools such as VirusTotal or Mandiant resources.
Basic scripting knowledge (Python, PowerShell, or SQL).
Entry-level certifications such as CompTIA Security+ or Splunk Fundamentals.
Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
REQNUMBER: 2611707
SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability