We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Cybersecurity Analyst Intern

Leidos Inc
$46800.00-$84600.00 per year
United States, Illinois, Scott Air Force Base
Sep 12, 2025

Description

Leidos, a leading defense, intelligence, and technology company, is seeking a motivated Cybersecurity Analyst Intern to join our Digital Modernization Group on the Global Solutions Management - Operations II (GSM-O II) contract at Scott AFB, IL. As part of our team, you'll contribute to the operations, sustainment, and defense of the Defense Information System Network (DISN) within the DOD Information Network (DODIN), supporting the Defense Information Systems Agency (DISA).

We are looking for highly motivated, driven, and capable candidates to join our GSM-O team and support our Cybersecurity/Network Assurance team! As a Cybersecurity Analyst Intern, you will assist in protecting critical DoD information systems by analyzing threat intelligence, investigating security alerts, and contributing to incident response efforts. This internship offers valuable hands-on experience in a real-world security environment.

What You'll Do:
* Perform cyber threat intelligence analysis to identify potential threats and vulnerabilities. Review DoD and open-source intelligence feeds for emerging threats and vulnerabilities. Identify Indicators of Compromise (IOCs) from threat intelligence reports and integrate them into sensors and SIEMs to improve detection capabilities.
* Correlate actionable security events from various sources (SIEM, IDS/IPS, etc.) to identify suspicious activity.
* Perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output to detect malicious activity on communications networks.
* Participate in the coordination of resources during incident response efforts, assisting in containment, eradication, and recovery activities.
* Triage security alerts from various sources (e.g., SIEM, IDS/IPS) to identify potential malicious activity on customer networks. This may involve analyzing log files, network traffic, and other data sources.
* Conduct preliminary analysis of potential security incidents, such as investigating suspicious network connections, analyzing malware samples, or reviewing system logs for anomalous activity.
* Assist in reporting security incidents to customers and United States Cyber Command (USCYBERCOM) in a timely and accurate manner.

What You'll Bring:
* Demonstrated academic knowledge of cybersecurity principles, with prior internship or project experience preferred.
* Actively pursuing a degree in a relevant field (e.g., Cybersecurity, Computer Science, Computer Engineering, Information Technology) from an accredited college/university.
* Proactive and eager to learn, with the ability to work independently, seek information, and communicate effectively (written and verbally).
* Solid understanding of TCP/IP protocols, common networking ports (e.g., 80, 443, 21, 22), and the OSI model. Ability to explain the principles of defense-in-depth and its application in securing a network. Basic knowledge of system administration concepts (Windows or Linux).
* Understanding of the Cyber Kill Chain methodology and/or the MITRE ATT&CK framework.
* Basic knowledge of malware analysis concepts and techniques (e.g., static and dynamic analysis), with experience using tools like VirusTotal or basic sandboxing environments.
* Ability to analyze security alerts, identify potential false positives, and prioritize investigations based on the severity and impact of the alert.
* Ability to obtain a Secret clearance to start (selected candidates will be sponsored for required clearance).
* Must be a US Citizen to qualify.
* Geographic Requirement: This position is based on-site at Scott AFB, IL.
* Work must be performed on Scott AFB, IL.
* Must have reliable transportation to and from Scott AFB, IL.

Preferred:
* Security+ and/or CySA+ certifications
* Academic knowledge of CND domains (Protect, Detect, Respond, and Sustain).
* Understanding of Computer Incident Response organization or Security Operations Center.
* Familiarity with an enterprise SIEM platform like Splunk or Elastic.
* Unix/Linux command line experience.
* Scripting and programming experience (e.g., Python, Bash).

At Leidos, we don't want someone who "fits the mold"-we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now."

If you're already scheming step 20 while everyone else is still debating step 2... good. You'll fit right in.

Original Posting:September 11, 2025

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.


Pay Range:Pay Range $46,800.00 - $84,600.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Applied = 0

(web-759df7d4f5-mz8pj)