Leidos has job opening for a Vulnerability Management Analyst Summer Intern in Gaithersburg, MD.
Leidos is seeking a cybersecurity intern in Gaithersburg, MD for the SUmmer of 2019 to help our Cybersecurity Intelligence and Response Team with vulnerability management. You will work in our world-class Security Intelligence Center which is responsible for
combating threats to protect our customer's most critical missions. Leidos is an active and long-term partner of the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and other federal agencies that are at
the forefront of combating threats in the .gov domain.
There is so much more to a career in cybersecurity than the stereotypical images of hackers and overworked IT professionals. Our mission at Leidos is to make the world safer, healthier, and more efficient through information technology,
engineering, and science. Our work provides an immediate impact in the real world, here are some examples:
• Building resilient cybersecurity for next generation nuclear power plants
• Developing data analytics solutions for IT, operational technology (OT), and IoT systems
• Defending networks for the United States and our allies
• Providing cybersecurity services for hospitals so they can focus on clinical outcomes
• Developing cutting edge technology with embedded security to minimize vulnerabilities
• Testing and evaluating software and systems to validate their claimed security features
• Designing policies, procedures, and standards to improve security across technologies
Come join us for a rewarding experience alongside talented cyber professionals who can help you achieve your career goals!
In the Cybersecurity Internship Program, you will have the opportunity to participate in:
• Team-based work
• Impactful, challenging, and rewarding projects
• Mentoring, training, and professional development opportunities
• Responsible for researching and analyzing vulnerabilities, identifying relevant threats, corrective action recommendations, summarizing and reporting results.
• Utilize the Splunk dashboard to monitor and track the status of scans, review key indicators, and top vulnerabilities.
• Develop approaches for addressing vulnerabilities including; system patching, deployment of specialized controls, code or infrastructure changes, and changes in development processes.
• Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and support teams.
• Recommend appropriate policy, standards, process and procedural updates as part of comprehensive remediation solutions.
• Validate remediation by reviewing application updates or deployed mitigations to verify resolution.
• Present final project to senior leadership at the end of the internship.
• Actively pursuing a Bachelor's degree in Cybersecurity, Information Security, Computer Science, Information Technology, or other related degree, and have completed at least three years of an undergraduate curriculum or two years of
experience and maintained a minimum 3.0.
• The following may be considered in lieu of pursuing a degree: Cybersecurity related training/certifications, Massive Open Online Courses (MOOCs) from top universities or institutions, experience, soft-skills, and passion for
• Demonstrated proficiency in oral and written communication.
• Demonstrated leadership or cyber skills gained from student clubs, community involvement or work experience.
• Fundamental understanding of networking, infrastructure, software development, and application technologies.
• Understanding of basic cyber threats such as phishing, ransomware, and social engineering.
• U.S. Citizenship is required.
• Basic understanding of vulnerability scanning and management tools (such as Nessus, Qualys, Splunk, and Nmap).
• Basic understanding of remote access, OSI model, and TCP/IP networking principles and protocols.
• Knowledge or experience with software engineering lifecycle support (requirements, design, implementation, test).
• Basic knowledge of Linux operating systems.
• Understanding of different threat actors such as the Advanced Persistent Threat and the threat landscape.
• Understanding of more advanced attack method types and their usage in targeted attacks such as malware implantation, perimeter vulnerabilities, application vulnerabilities, lateral movement, etc.
• Desired soft skills
o Analytical mind with creative problem solving ability
o Critical thinking
o Curious and agile learner
o Detail oriented
o Desire to learn how things work
o Early adopter of new technology
o Ability to clearly and concisely summarize information
External Referral Bonus:
Potential for Telework:
Clearance Level Required:
Scheduled Weekly Hours: