Job Overview

Location
England, United Kingdom
Job Type
Full Time
Date Posted
2 months ago

Additional Details

Job ID
28099
Job Views
27

Job Description

What You’ll Do:

  • Maintain a detailed understanding of the technical details of cloud intrusions through analyzing cloud provider activity logs, such as AWS CloudTrail and Azure Activity Logs.

  • Convert your understanding to an intelligence report

What You’ll Need:

  • Familiarity with at least one cloud service provider (AWS, Azure, GCP) as a user e.g., creating identities

  • Investigative mindset

  • Team player: someone who is eager to help, teach, and learn from others

  • Strong problem-solving skills

  • Independent Learner

Bonus Points:

  • Knowledge of programming and scripting languages, in particular Python

  • Ability to express complex technical and non-technical concepts

  • Understanding of identity and access management for at least one major cloud service provider (AWS, Azure, GCP)

  • Familiarity with at least one major cloud service provider’s (AWS, Azure, GCP) cloud activity logs e.g. CloudTrail, Azure Activity logs, GCP Audit Logs

What You’ll Do:

  • Create tools to automate analysis tasks and tracking of threat actors.

  • Contribute to active mitigation efforts with technical expertise.

  • Track relations between new threats and existing actors using in-house tools.

  • Document threat evolutions and intelligence gaps for the broader Intelligence Team.

  • Create host-based and network-based signatures suited for large-scale hunting, detection, and tracking of threats.

What You’ll Need:

  • Team player: someone who is eager to help, teach, and learn from others

  • Malware-analysis or knowledge of reverse-engineering principles

  • First exposure to analyzing malware targeting mobile devices

  • Ability to reconstruct incidents based on cloud activity logs from at least one major cloud service provider (AWS, Azure, or GCP)

  • Strong problem-solving skills

  • Ability to express complex technical and non-technical concepts

  • Ability to learn new analysis techniques quickly, especially when faced with less-common file types

  • Solid writing skills

  • Knowledge of programming and scripting languages, in particular Python

  • Actively enrolled in university and completing an undergraduate degree in Cybersecurity, Computer Science or related field in your penultimate year of study (2026 graduate)

Bonus Points:

  • Solid understanding of mobile platforms

  • Dynamic instrumentation frameworks

  • Experience identifying and classifying malicious tooling through development of signatures that can be used for tracking and hunting purposes

  • Familiarity with at least a couple of the following tools and languages;

  • IDA

  • Ghidra

  • JEB

  • WinDbg

  • x86dbg/x64dbg

  • Parallels or Virtual Box

  • Java

  • C/C++

  • Rust

  • Golang

  • C#

  • .NET

This is a 12 week internship commencing on Monday 2nd June and completing on Friday 22nd August.

#LI-Remote

#LI-RM1

What You Can Expect:

  • Remote-friendly and flexible work culture

  • Market leader in compensation and equity awards

  • Paid holidays (including birthday holidays) and 401k matching (where applicable)

  • Professional development opportunities including workshops, tech talks, and Executive Speaker Series

  • Assigned mentors from across the company for continuous support and feedback

  • Participation in companywide initiatives including ERGs, FalconFIT, Wellness Programs, and Employee Assistance Program

  • Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections

  • Vibrant office culture with world class amenities

  • Ownership of impactful projects that move the company forward

  • Great Place to Work Certified™ across the globe

Qualification

Any Graduate

Experience Requirements

Fresher Experience

Location

Cookies

This website uses cookies to ensure you get the best experience on our website. Cookie Policy

Accept