Incident Response Intern

Incident Response Intern

Regular price

Job Information
FireEye, Inc. Incident Response Internship in New York, New York A successful Incident Response intern at Mandiant should possess an understanding of both information security and computer science. They should understand basic concepts such as network security, forensics, and operating system functionality and be able to learn advanced concepts such as malware triage, Tactics, techniques, and procedures (TTPs), working with enterprise security controls and building methodologies to enhance investigation processes. This is not a press the button type of job; this career is technical and challenging with opportunities to work in some of the most exciting areas of security consulting on extremely technical and challenging work. You will be building up a foundation in responding to and managing impactful cyber breaches. If you can think like an attacker, stay one step ahead, think well outside the box, or are astute enough to quickly learn these skills, then you are the type of consultant were looking for. As a Mandiant intern, you will get hands-on experience with complex problems on a daily basis. We help our clients protect their most sensitive and valuable data through comprehensive and real world scenario testing. To be successful, you will quickly assimilate new information as you face new client environments on a weekly or monthly basis. You will understand all the threat vectors to each environment and properly assess them. You will get to work with some of the best incident responders in the industry, causing you to develop new skills as you progress through your career.

 What You Will Do:
* Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations
* Develop comprehensive and accurate reports and presentations for both technical and executive audiences
* Effectively communicate and discuss findings and strategy with internal stakeholders including leadership and technical team members
* Recognize and safely utilize attacker tools, tactics, and procedures
* Develop scripts, tools, or methodologies to enhance Mandiants incident response processes and capabilities

Minimum Requirements:
* 1+ years' experience, via internships, classes, projects and similar, in at least two of the following: o Windows disk and memory forensics o Experience with static and dynamic malware analysis o Shell scripting or automation of simple tasks using Perl, Python, or Ruby o Reverse engineering malware, data obfuscators, or ciphers o Source code review for control flow and security flaws
* 1+ years exposure and working with tools used for forensic collection and analysis
* Understanding of network protocols, data on the wire, and covert channels
* Understanding of Unix/Linux/Mac/Windows operating systems, including bash and PowerShell
* Must be eligible to work in the US without sponsorship Preferred Qualifications
: * Prior experience in a technical security internship
* Experience in security competitions, CTFs and/or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc
* Related projects around cybersecurity, programming, etc 
        Sign In For Details

        Mentorship at Nestria

        Learn from the Best

        Remove the uncertainty of joining a new field. Get advice from those who’ve been there, on whatever topics you struggle with.

        You may also like