Detection Engineering Intern (Part-Time/Seasonal)
Fully Remote Stow, OH
Description

Overview

Binary Defense, headquartered in Stow, Ohio, is a rapidly growing cybersecurity software and services firm with solutions that include best-in-class Managed Detection & Response powered by a Managed Open XDR platform. The company has a 24/7 Security Operations Center that monitors their own proprietary managed EDR software as well as supporting leadings network, cloud and identity solutions. Advanced threat hunting, defense validation and counterintelligence services provide additional layers of security. Our expert security staff and technology help shield businesses from cyberattacks.
 

Binary Defense is a fast-paced business that enjoys a relaxed culture (from anywhere in the continental United States) and flexible remote work options. For the fourth year in a row, Binary Defense has been recognized as one of the fastest-growing private companies in the US on the Inc. 5000 list! At the 2022 Greater Cleveland Partnership’s “Best of Tech Awards,” Binary Defense was recognized as the “Best Technology Solution” for the third year in a row. We’ve also been named “North American Partner of the Year” by AT&T Cybersecurity, providing best-in-class SIEM technology and service.  Binary Defense recently completed a $36 million growth equity round of funding from Invictus Growth Partners to accelerate our growth and technology and service delivery offerings.


Binary Defense is seeking a Detection Engineer Intern to join our summer internship program. As a Detection Engineer Intern, you will work with Security Operations, Incident Response, and Threat Hunting teams to create new detection logic from multiple data sources. You will also work closely with Threat Intelligence to monitoring the ever evolving threat landscape to drive new detection strategies to protect our clients. 


Interns will have the opportunity to work on practical projects involving reverse-engineering malware, log analysis in Azure Sentinel, Splunk, or other enterprise-grade security tools, software development projects, and threat intelligence research.

At the conclusion of the internship, Detection Engineer interns will be expected to deliver a capstone project showcasing the skills learned during the program to the team and leadership. 


Participation in the internship program does not guarantee a full time job later, but may be a positive factor in consideration for a future full-time role as a Threat Researcher when positions are open.


Key Responsibilities

· Learn to use internal or external threat intelligence to drive new ideas for detection rules

· Build detection logic utilizing multiple log sources to detect malicious activity

· Conduct analysis to extract artifacts from an attacker's TTPs to drive new detection capabilities

· Develop detection logic for different SIEM platforms.

· Research new attack trends to find new ways to detect malicious activity.

· Other projects and responsibilities, as assigned by the direct manager

Requirements

Education/Experience

· Any formal or informal information security training or experience that includes malware analysis, log analysis, network forensics, or incident response, and some scripting or programming experience


Other Knowledge, Skills and Abilities

· Excellent communication skills – ability to convey technical information clearly


Preferred

· Competed in Capture the Flag (CTF) competitions

· Competed in OpenSOC competition

· Participated in CCDC

· Participated in Cyber Clubs (high school or college)

· Any blogs or conference presentations given

· Computer Science, Cybersecurity or Digital Forensics major 

· SEC+ or other security certifications will be favorably considered but are not required