Blackpoint Cyber Logo

Blackpoint Cyber

MDR Analyst Skillbridge Intern

Reposted 13 Days Ago
Remote
Hiring Remotely in United States
Internship
Remote
Hiring Remotely in United States
Internship
Internship providing hands-on experience in cybersecurity, focusing on threat analysis, incident reporting, process improvement, and collaboration in a SOC environment.
The summary above was generated by AI

Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode,  fueled by a recent $190m series C round. 

Blackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth mode, fueled by a recent $190m series C round.

Company Culture

On this team, we value high-quality execution, ownership, and strong morals. With us, principles are never tested, and we are proud to always do right by our customers. If you’re a driven professional with a passion for learning and contributing towards the best, then Blackpoint welcomes you. Our team is energetic and collaborative, maintaining a high-performance culture and enabling growth through overcoming challenges in the modern cyberthreat landscape.

Internship Details:

This internship will provide you with a thorough understanding of the role outlined below, equipping you with the skills and experience necessary for success in the cybersecurity industry.

TO BE ELIGIBLE FOR DOD SKILLBRIDGE JOB OPPORTUNITES YOU MUST BE AN ACTIVE MEMBER OF THE U.S. MILITARY WITH 180 DAYS OF SERVICE OR FEWER REMAINING PRIOR TO YOUR DATE OF SEPARATION AND HAVE AT LEAST 180 CONTINUOUS DAYS OF ACTIVE SERVICE

Please only apply if you meet the above requirements and able to work one of the following shifts:
Night Shift (M-F 12:00 AM - 8:00 AM ET)
How You'll Make an Impact:

  • Analyze and evaluate anomalous network and system events in a 24x7x365 Security Operation Center (SOC) environment via conducting lead-less threat hunting.

  • Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis.

  • Develop Incident analysis reports and work across business units and customers to bring issues to a close.

  • Help design and build operational processes and procedures to improve overall SOC efficiency.

  • Provide actionable threat and vulnerability analysis based on security events for many independent customer environments.

  • Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations.

  • Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis.

What you'll Bring:

  • Three (3+) years of experience in an information security role. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement

  • Experience working in a Security Operations Center (SOC)

  • One (1+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process

  • Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.)

  • Robust understanding of at least two of the following: Windows, Linux or OSX;

  • Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go

  • Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365

  • Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results

  • Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection)

  • Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences

Bonus:

  • Bachelor’s Degree in Computer Science or related technical discipline

  • Network/System Administration and/or Engineering

  • Deep forensic knowledge of Windows, Mac OS and/or Linux

  • Experience in Digital Forensics and Incident Response a plus

  • Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging) Pentesting/Red/Blue Team

  • Capture The Flag (CTF) Development

Blackpoint Cyber welcomes and encourages applications from qualified individuals of all races,  colors, religions, sex, sexual orientation, gender identity or expression, national origin, age, marital  status, or any other legally protected status. We are committed to equality of opportunity in all  aspects of employment.  For eligible employees in the US, Blackpoint offers competitive Health, Vision, Dental, and Life Insurance plans, a robust 401k plan, Discretionary Time Off, and other minor perks.

Top Skills

AWS
Azure
Elk Stack
Go
Linux
Osx
Powershell
Python
Windows

Similar Jobs

An Hour Ago
In-Office or Remote
2 Locations
170K-195K Annually
Senior level
170K-195K Annually
Senior level
Cloud • Greentech • Social Impact • Software • Consulting
The Senior Enterprise Account Executive will drive enterprise sales by acquiring new customers, managing pipelines, and collaborating with marketing. This role involves high-level negotiations, strategic account planning, and maximizing revenue through effective SaaS sales techniques.
Top Skills: Linkedin Sales NavigatorSalesforceZoominfo
An Hour Ago
Remote
USA
105K-198K Annually
Senior level
105K-198K Annually
Senior level
Cloud • Greentech • Social Impact • Software • Consulting
The Senior Mid-Market Account Executive is responsible for new customer acquisition, managing complex sales cycles, and building relationships with C-level executives. This role focuses on generating pipeline, closing new deals, and collaborating internally to drive sales success.
Top Skills: 6SenseGongLinkedin Sales NavigatorOutreachSalesforceZoominfo
An Hour Ago
Remote or Hybrid
MA, USA
Mid level
Mid level
Artificial Intelligence • Cloud • Information Technology • Sales • Security • Software • Cybersecurity
The Account Executive will drive sales of Penetration Testing and Incident Response services, managing prospects through contract closure, and collaborating with cross-functional teams.
Top Skills: Salesforce

What you need to know about the Charlotte Tech Scene

Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.

Key Facts About Charlotte Tech

  • Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
  • Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
  • Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
  • Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account