SOC Analyst Intern

ePayPolicyAustin, TX
20dHybrid

About The Position

The Security Operations Center (SOC) Analyst Intern will play a vital role in supporting the defense of ePayPolicy’s corporate and production environments. Reporting to the Head of Information Security, this position offers a hands-on opportunity to learn how to monitor, detect, and respond to security threats in real-time. This is an operational learning role suited for a vigilant problem-solver who is eager to hunt for threats and investigate anomalies. You will work closely with experienced engineers to distinguish between false positives and genuine security incidents, gaining practical experience in how a modern SOC operates.

Requirements

  • Education/Background: A background in Computer Science, Cybersecurity, or Information Systems—whether you are currently pursuing a degree, possess equivalent self-taught skills, or are an IT professional looking to transition into security.
  • Technical Curiosity:
  • Basic familiarity with EDR concepts or tools (CrowdStrike, SentinelOne) and SIEM logic.
  • Understanding of Cloud Security basics (Microsoft Azure, Azure AD/Entra ID).
  • Solid foundation in Networking protocols (TCP/IP, DNS, HTTP/S) and an interest in learning how to analyze packet captures or logs.
  • Analytical Mindset: Ability to look at data and spot patterns or anomalies that don't look right.
  • Communication: Ability to communicate clearly and ask questions when you don't understand a concept—we value curiosity over knowing everything on day one.
  • Passion: A genuine interest in the cybersecurity landscape, staying current with the latest threat intelligence, CVEs, and attack vectors.

Nice To Haves

  • Current pursuit of certifications such as CompTIA Security+, CySA+, or Azure Security Engineer Associate is a plus.

Responsibilities

  • Monitor & Triage: Learn to actively monitor security alerts from our SIEM, EDR (CrowdStrike), and cloud environments (Azure) to identify potential threats.
  • Incident Response Support: Assist the team in the initial investigation of security incidents, including phishing attempts and malware alerts, following the Incident Response Lifecycle.
  • Defense Optimization: Participate in purple team exercises to validate endpoint configurations (CrowdStrike) and help verify that our detection logic effectively catches simulated attacks.
  • Threat Hunting: Learn proactive threat hunting techniques to search for undetected threats or indicators of compromise (IoCs) within our network.
  • Vulnerability Management: Assist in analyzing vulnerability scan results and coordinating with the IT Ops team to track remediation efforts.
  • Email Security: Help analyze suspicious emails reported by employees, review anti-phishing controls, and provide feedback to users.
  • Rule Tuning: Assist senior team members in tuning SIEM rules and EDR policies to reduce noise and filter out false positives.
  • Documentation: Maintain accurate records of investigations and incident response actions within our ticketing system, helping to build out our internal knowledge base (Playbooks).

Benefits

  • Company Holidays
  • In-office perks (Daily lunch stipend, access to the onsite gym, and two fully-stocked kitchens)
  • Company provided laptop
  • Open invite to company-events
  • Company swag
  • Competitive salary
  • Comprehensive benefits package with employer-paid basic life and disability premiums
  • 401K
  • Unlimited PTO
  • Company-sponsored quarterly “ePayItForward” initiatives
  • Supportive and inclusive company culture with a focus on work/life balance
  • Fully-stocked kitchen
  • Lunch stipend when working onsite
  • Open communication (We won’t box you in! If you have a cool idea for a product improvement or a suggestion on how to improve the customer experience, let’s talk about it. We value everyone’s ideas and opinions.)
  • Huge opportunity for growth
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service