Blackpoint Cyber, Inc. logo

MDR Analyst SkillBridge Intern - Night Shift (M - F from 12 00 AM - 8 00 AM ET)

Job Overview

Location

Remote

Job Type

Full-time

Category

Cybersecurity

Date Posted

February 16, 2026

Full Job Description

đź“‹ Description

  • • Blackpoint Cyber is seeking a highly motivated and detail-oriented MDR Analyst SkillBridge Intern to join our world-class cybersecurity team. This is a unique opportunity for active U.S. military members with 180 days or fewer remaining in their service to gain invaluable hands-on experience in a cutting-edge Security Operations Center (SOC) environment. Founded by former National Security Agency (NSA) cyber operations experts, Blackpoint Cyber is at the forefront of threat hunting, detection, and remediation technology, serving commercial customers globally. Fueled by a recent $190 million Series C funding round, we are experiencing hyper-growth and are looking for driven individuals who are passionate about learning and contributing to the best in the industry.
  • • As an MDR Analyst Intern, you will play a critical role in safeguarding our clients' digital assets by analyzing and evaluating anomalous network and system events in a 24x7x365 SOC environment. You will conduct lead-less threat hunting, a proactive approach to identifying potential security incidents before they escalate. This involves meticulously examining logs, network traffic, and system behaviors to detect subtle indicators of compromise.
  • • You will collaborate closely with our experienced MDR Analysts, researching and investigating emerging cybersecurity threats. This collaborative effort will not only deepen your understanding of the threat landscape but also prepare you to become an escalation point of contact for advanced intrusion analysis. Your ability to dissect complex security events and articulate findings will be paramount.
  • • A key responsibility will be developing comprehensive incident analysis reports. You will work across various business units and directly with customers to ensure that identified issues are thoroughly investigated and brought to a satisfactory resolution. This requires strong communication and project management skills to drive closure on security incidents.
  • • You will contribute to the continuous improvement of our SOC operations by helping to design and build operational processes and procedures. This includes identifying inefficiencies, proposing solutions, and implementing best practices to enhance overall SOC efficiency and effectiveness. Your insights will directly impact our ability to respond rapidly and accurately to threats.
  • • Providing actionable threat and vulnerability analysis based on security events is another core function. You will analyze security data from numerous independent customer environments, identifying potential risks and providing clear, concise recommendations for mitigation. This requires a deep understanding of various attack vectors and defensive strategies.
  • • To further enhance our threat intelligence capabilities, you will build and maintain test lab environments. These environments will be used to research emerging techniques, analyze new malware, and contribute to the internal and external knowledge development of our threat operations team. Your findings will help us stay ahead of evolving cyber threats.
  • • You will also review sandbox technologies, analyzing artifacts uncovered during threat analysis to identify additional Indicators of Compromise (IOCs). This deep-dive analysis is crucial for building robust threat detection rules and improving our overall detection capabilities.
  • • This internship is designed to provide you with a thorough understanding of the MDR Analyst role, equipping you with the essential skills and practical experience necessary for a successful career in the cybersecurity industry. We value high-quality execution, ownership, and strong morals. At Blackpoint Cyber, principles are never tested, and we are proud to always do right by our customers. Our team is energetic and collaborative, fostering a high-performance culture that enables growth through overcoming challenges in the modern cyberthreat landscape.
  • • Please note: This role operates on a Night Shift schedule, Monday through Friday, from 12:00 AM to 8:00 AM ET. These scheduled days and times are non-negotiable, and applicants must ensure full availability before applying. This commitment is essential for maintaining our 24x7x365 SOC coverage.

🎯 Requirements

  • • Three (3) years of experience in an information security role, or progressive relevant training and/or certification may substitute for one (1) year of the experience requirement.
  • • Experience working in a Security Operations Center (SOC).
  • • One (1) year of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process.
  • • Deep knowledge of assessing threat indicators in a Windows Environment (e.g., Malware, Malicious Anomalies, Abnormal network Activity, Root Level Compromise, Forensic Artifacts, etc.).
  • • Robust understanding of at least two of the following operating systems: Windows, Linux, or OSX.
  • • Familiarity with ELK stack (Dashboards, Logstash Config, Searching).
  • • Scripting/Programming experience with Powershell, Python, and Go.
  • • Familiarity with AWS services such as EC2, S3, and IAM, and Azure M365.
  • • Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results.
  • • Excellent problem-solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection).
  • • Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences.

🏖️ Benefits

  • • Competitive Health, Vision, Dental, and Life Insurance plans (for eligible employees in the US).
  • • Robust 401k plan (for eligible employees in the US).
  • • Discretionary Time Off (DTO).
  • • Opportunity to gain hands-on experience in a leading cybersecurity firm.
  • • Mentorship from former NSA cyber operations experts.
  • • Professional development and training in advanced cybersecurity techniques.
  • • Exposure to a high-performance, collaborative, and energetic team culture.

Skills & Technologies

Python
Go
AWS
Azure
Linux
Junior
Remote
Degree Required

Ready to Apply?

You will be redirected to an external site to apply.

Blackpoint Cyber, Inc. logo
Blackpoint Cyber, Inc.
Visit Website

About Blackpoint Cyber, Inc.

Blackpoint Cyber provides managed detection and response (MDR) and network security services to small and midsize businesses and managed service providers. The company combines a proprietary cloud-native security platform with 24/7 analyst-led monitoring to identify, contain, and remediate threats in real time. Core offerings include endpoint detection and response, network traffic analysis, lateral movement detection, and incident response. Founded in 2014 by former U.S. government cyber operators, Blackpoint focuses on reducing dwell time, minimizing business disruption, and delivering actionable threat intelligence to organizations lacking in-house security teams.

Similar Opportunities

UMB Financial Corporation logo

UMB Financial Corporation

MO - Kansas City - 1010 Grand Blvd
Full-time
Expires Mar 8, 2026
Senior
Remote
Degree Required

2 months ago

Apply
❌ EXPIRED
Pisa
Full-time
Expired Nov 13, 2025
Junior
Hybrid
Degree Required

5 months ago

Apply
Remote
Full-time
Expires Apr 17, 2026
Senior
Remote

9 days ago

Apply
Remote
Full-time
Expires Apr 18, 2026
Linux
Remote
Degree Required

8 days ago

Apply