Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Technical Intelligence Analyst Internships - Summer 2020

FireEye, Inc.

Technical Intelligence Analyst Internships - Summer 2020

Reston, VA
Internship
Paid
  • Responsibilities

    Job Description

    PLEASE NOTE: This application is intended for students to express their interest in our 2020 Technical Intelligence Internships – this application will be used to fill multiple roles within this team.

    FireEye Threat Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools, and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during, and after an attack.

    Interns in this position will perform malware analysis and related technical analysis tasks in support of FireEye Threat Intelligence.

    RESPONSIBILITIES

    • Track malware, malicious campaigns, or actors through technical analysis of data, malicious codes, exploits, and infrastructure.
    • Perform reverse engineering and behavioral analysis of malicious codes and related artifacts.
    • Collaboratively and independently write reports documenting findings that intelligence customers can use to better understand malicious activity and how to defend themselves.
  • Qualifications

    Qualifications

    Candidates for this internship will generally need to demonstrate basic capabilities to perform malware analysis and related technical analysis functions. The internship will some include on-the-job training to provide specific subject matter expertise. So, interns will need to have the capability to learn designated subject matter and roles relatively easily, but are not necessarily expected to already have direct employment history in malware analysis. Internship candidates will be asked to perform a simple evaluation task during the candidate selection process to assess their capability.

    Beneficial experience, skills, and knowledge could include the following:

    • Basic understanding of malware analysis or reverse engineering
    • Understanding of how operating systems work and how malicious actors exploit them
    • Understanding of network traffic and fundamental networking/communication protocols such as BGP, DNS, HTTP, TLS/SSL, SMTP, etc.
    • Awareness of currently-prominent cyber threats, malware, and computer exploitation tactics
    • Experience with any of the following concepts and related tool sets:
      • Network sniffers
      • Process analysis tools
      • Registry analysis tools
      • File analysis tools
      • Memory analysis tools

     

    Additional Information

    All your information will be kept confidential according to EEO guidelines.