Incident Response Intern

  • Intern

Company Description

Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

Job Description

Do you love the challenge of figuring out solutions to intricate technology puzzles? Do you like to help others solve their network and information security issues? If you answered YES, then consider a career at FireEye Mandiant as a Consulting Intern!

We have the expertise and experience in information security. This is our focus. You’re not just a number and you won’t get lost in the shuffle. You will be working on challenging technical projects that make an impact. You’ll be visible. You’ll be exposed to many different environments and technologies. You’ll learn from our best incident responders and red teamers.

We investigate breaches that make headlines (and many more that don’t), as well as break into applications and systems to identify security gaps for our clients. We find evil and solve crime, and are seeking candidates who possess the ability to think like an attacker and stay one step ahead of the game.

 

Find your niche among the cool projects you’ll be involved with, such as:

  • Incident response
  • Host and network forensics
  • Network traffic analysis
  • Malware analysis and reverse engineering
  • Penetration testing Network, web and mobile application security assessments
  • Source code reviews

 


 

Qualifications

  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations
  • Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
  • Perform network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments and social engineering assessment
  • Build internal scripts, tools and methodologies to enhance our capabilities
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Work with security and IT operations at clients to implement remediation plans.

 

 

ADDITIONAL INFORMATION

  • Strong technical acumen and ability to quickly assimilate new information
  • Ability to successfully interface with clients (internal and external) and manage expectations of others
  • Ability to document and explain technical details in a concise, understandable manner.

 

 

Privacy Policy