Systems Developer Intern
PARTNER COMPANY
FTI
ENGAGEMENT TYPE
In-Person
LOCATION
Chesapeake, VA
Opportunity Description
Position Overview
This internship supports the Cyber Red Team mission by assisting in secure software
development, cyber vulnerability assessments, and threat emulation activities. This role
is designed to help transitioning service members build on their existing technical and
operational skills to contribute to critical defense missions while gaining hands-on
experience in cyber operations.
Skills Required:
Foundational knowledge of secure software development practices.
Basic programming experience in one or more languages: Python, C, C++, or similar.
Familiarity with Windows and Linux operating systems.
Ability to follow technical processes and document findings.
Strong analytical and problem-solving skills.
Effective verbal and written communication skills.
Primary Responsibilities:
Assist in the design, testing, and implementation of secure software solutions.
Conduct basic reverse-engineering and debugging tasks under supervision.
Learn and apply industry tools such as IDA Pro, WinDbg, and Metasploit.
Support vulnerability validation and penetration testing tasks.
Participate in threat emulation activities and contribute to the development of techniques, tactics, and procedures (TTPs).
Assist with documentation, including after-action reports and threat analysis summaries.
Support Red Team exercises and network cyber assessment events.
Qualifications:
Required
Active U.S. Dept. of Defense Secret clearance.
2+ years of experience in military IT, cybersecurity, or related technical fields.
Familiarity with network protocols (HTTP, FTP, etc.) and operating systems (Windows/Linux).
Basic understanding of cybersecurity principles and risk management concepts.
Ability to learn new tools and technologies quickly.
Preferred
TS/SCI eligibility.
Experience in any of the following areas: vulnerability assessments, penetration testing, or cyber incident response.
Foundational knowledge of risk management frameworks or cybersecurity requirements during system acquisitions.
Prior exposure to cloud-based systems or information system architecture.