OneMain Financial Jobs

Job Information

SAIC Cybersecurity Analyst Intern in Washington, District Of Columbia

Description

SAIC is seeking a motivated Cybersecurity Analyst Intern to support a critical U.S. government agency in the National Capital Region. This internship provides hands-on exposure to Security Operations Center (SOC) functions, including incident response, threat detection, and security monitoring across on-premises and cloud environments.

This role is designed for students or early-career professionals looking to build real-world cybersecurity experience while working alongside experienced analysts in a collaborative environment.

Key Responsibilities:

  • Assist in monitoring and reviewing security alerts using tools such as Splunk Enterprise Security and CrowdStrike Falcon under supervision.

  • Support analysis of suspicious or phishing-related emails using tools such as Cisco IronPort, VirusTotal, and other intelligence sources.

  • Perform initial triage of low-severity alerts and escalate findings to senior analysts following established procedures.

  • Assist with access review activities using CyberArk under guidance.

  • Help review, assign, and track cybersecurity tickets using ServiceNow and internal collaboration tools.

  • Support identification of indicators of compromise (IOCs) and document recommended mitigation actions for review by senior staff.

  • Contribute to SOC documentation efforts, including incident summaries and updates to response procedures.

  • Assist in reviewing Cybersecurity and Infrastructure Security Agency (CISA) advisories to assess potential impact.

  • Collaborate with SOC team members to support process improvements and operational efficiency.

  • Stay current with emerging threats and cybersecurity best practices.

Qualifications

Required:

  • Actively pursuing or recently completed a Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related field.

  • Ability to obtain and maintain a Public Trust requiring U.S. Citizenship or Green Card status.

  • Foundational understanding of cybersecurity concepts, including common attack types and basic incident response principles.

  • Familiarity with SIEM or EDR tools through coursework, labs, or personal projects.

  • Ability to analyze basic log data and follow documented processes.

  • Strong attention to detail, organization, and communication skills.

  • Ability to work effectively in a team-oriented environment.

Preferred Qualifications:

  • Coursework or lab experience in phishing analysis or incident response.

  • Exposure to threat intelligence tools such as VirusTotal or Mandiant resources.

  • Basic scripting knowledge (Python, PowerShell, or SQL).

  • Entry-level certifications such as CompTIA Security+ or Splunk Fundamentals.

Target salary range: Up to $40,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.

REQNUMBER: 2611707

SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability

DirectEmployers