DarkWeb Research - Threat Intel Intern (Cyber Fusion)

United States
Managed Services – 125 - Cyber Fusion /
Intern /
Remote
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients.  We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India.

About the Role:
We are seeking a skilled and driven Dark Web Researcher Intern to join our Threat Intelligence team. In this role, you will leverage the CyberInt platform and a suite of dark web and threat actor monitoring tools to proactively identify emerging risks, data exposures, and threat activity targeting our clients across industries such as healthcare, education, and finance.
You will play a key role in brand protection, leaked credential discovery, social media risk analysis, and monitoring for phishing domains and attack surface exposures. Your research will extend to initial access brokers (IABs) and dark web chatter that could signal intent or active targeting of our clients. You'll also support our threat hunting operations by creating queries and validating whether observed risks have materialized into active threats. You will also assist in developing customer facing reports and building automations that help improve the service.

Responsibilities:

    • Monitor and analyze dark web forums, marketplaces, Telegram channels, and leak sites using CyberInt and other OSINT/darknet tools.
    • Identify and assess:
    • Leaked credentials and sensitive data
      Phishing domains and impersonation sites
      Threat actor discussions mentioning client brands or environments
    • Sale of access by Initial Access Brokers (IABs)
    • Track emerging threat actor TTPs, malware families, ransomware groups, and underground ecosystem trends.
    • Correlate dark web findings with client infrastructure and attack surface to assess risk and exposure.
    • Develop threat hunting queries (e.g., using SIEM/EDR platforms) based on dark web discoveries to determine active targeting or compromise.
    • Create concise, actionable intelligence reports to communicate risks to internal and client stakeholders.
    • Assist in incident enrichment, providing dark web context and attribution to ongoing investigations or IR cases.
    • Stay current on major malware and ransomware variants, and support attribution or profiling work when actors reference client assets.

Requirements:

    • Currently a Junior or Senior in pursuit of a bachelor's degree.
    • Familiarity with threat frameworks such as MITRE ATT&CK
    • Strong analytical, problem-solving, and communication skills.
    • Passionate about cybersecurity research or threat intelligence communities.
    • Familiarity with insider threat detection models and risk-based hunting strategies.
    • This is a year long internship program and the selected candidate must commit to the full year.
    • Work times can be flexible, however, 30 hours per week is expected during non-school times and 20 hours per week is expected when classes are in session
Cyderes is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status.

Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.