This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Sigma’s early career program is the launchpad for the next generation of engineers and innovators. As an Intern at Sigma, you’ll work on various Cyber Security domains and learn efficient Security engineering for large scalable systems/environments. Our interns connect directly with our Engineering teams, IT and customer facing teams across the organization everyday. We’re looking for students who bring curiosity, a spirit for collaboration, and a desire for securing the world. Sigma is shaping the future of business insights and data visualization.
Job Responsibility:
Triage and investigate security alerts from a diverse stack including SIEM, EDR, WAF, and DLP platforms
Help refine these systems by tuning "detections-as-code" to reduce noise and improve signal quality
Conduct hypothesis-driven hunts across telemetry data (cloud, identity, and network) to uncover emerging threats that may have bypassed automated defenses
Research attacker TTPs and use the MITRE ATT&CK framework to develop and deploy new detection logic
Analyze cloud configurations and IAM policies to identify misconfigurations, support vulnerability remediation, and validate security best practices
Investigate suspicious macOS activity, analyze malicious emails, and support internal phishing simulation programs
Contribute to the team’s knowledge base by documenting processes, findings and creating playbooks that improve the broader team's response capabilities
Requirements:
Currently enrolled in a university graduate degree program in the U.S with a graduation date of December 2026 or later
Able to intern from June 2026 through early September 2026 (12 weeks)
Legally authorized to work in the US during the Summer 2026 program
Located within the San Francisco Bay Area or willing to relocate during the internship
Able to work 40 hours per week (full-time) in a hybrid work model with a minimum of 4 days in office
Currently pursuing a Master’s degree in Computer Science, Cybersecurity, or a related field, with the intent to return to school following the internship for at least one more term
A solid understanding of networking (TCP/IP, DNS, HTTP) and at least one operating system (Linux or macOS)
The ability to parse and analyze logs from multiple sources to identify malicious patterns and security events
Comfort with scripting or automation using Python, SQL, or similar languages
Nice to have:
Hands-on exposure to SIEM, EDR, or cloud platforms (AWS, GCP, Azure)