This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Security Engineering Graduate Intern, you will join a team dedicated to protecting our cloud and enterprise environments. This is a hands-on technical role where you’ll work alongside experienced engineers to defend our infrastructure across SaaS, cloud, endpoints, and identity platforms. You will bridge the gap between theoretical security and production-level defense, focusing on Detection Engineering, Incident Response, and Cloud Security Operations. This role is designed for students who are passionate about understanding attacker behavior and building the systems that stop them.
Job Responsibility:
Triage and investigate security alerts from a diverse stack including SIEM, EDR, WAF, and DLP platforms
Help refine these systems by tuning "detections-as-code" to reduce noise and improve signal quality
Conduct hypothesis-driven hunts across telemetry data (cloud, identity, and network) to uncover emerging threats
Research attacker TTPs and use the MITRE ATT&CK framework to develop and deploy new detection logic
Analyze cloud configurations and IAM policies to identify misconfigurations, support vulnerability remediation, and validate security best practices
Investigate suspicious macOS activity, analyze malicious emails, and support internal phishing simulation programs
Contribute to the team’s knowledge base by documenting processes, findings and creating playbooks
Requirements:
Currently enrolled in a university graduate degree program in the U.S with a graduation date of December 2026 or later
Able to intern from June 2026 through early September 2026 (12 weeks)
Legally authorized to work in the US during the Summer 2026 program
Located within the San Francisco Bay Area or willing to relocate during the internship
Able to work 40 hours per week (full-time) in a hybrid work model with a minimum of 4 days in office
Currently pursuing a Master’s degree in Computer Science, Cybersecurity, or a related field, with the intent to return to school following the internship for at least one more term
A solid understanding of networking (TCP/IP, DNS, HTTP) and at least one operating system (Linux or macOS)
The ability to parse and analyze logs from multiple sources to identify malicious patterns and security events
Comfort with scripting or automation using Python, SQL, or similar languages
Nice to have:
Hands-on exposure to SIEM, EDR, or cloud platforms (AWS, GCP, Azure)