Security Analyst Internship

TENEX.AI

2h ago 0 views 0 applications
Full-time On-site
Kansas City, MO SOC
Competitive
Full-time
Security Analyst

Job Description

Company OverviewTENEX is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is composed of industry experts with deep experience in cybersecurity, automation and AI-driven solutions. Backed by leading investors, we are rapidly growing and seeking top talent to join our mission of revolutionizing the AI-Native MDR landscape.We’re a fast growing startup backed by industry experts and top tier investors led by Crosspoint Capital Partners and also backed by Shield Capital, DTCP (formerly Deutsche Telekom Capital Partners), Deepwork Capital, and the Florida Opportunity Fund. Seed round led by Andreessen Horowitz (a16z). As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside.Culture is one of the most important things at TENEX.AI—explore our culture deck at culture.tenex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in-person work.About the RoleThe Security Analyst Intern is a hands-on learning role designed for students in their final year of study or recent graduates pursuing a career in cybersecurity. You'll shadow our SOC Analysts and engineers, get exposure to live monitoring and triage workflows, and learn how a modern AI-driven SOC operates end-to-end. The goal: give you a meaningful, resume-building summer that bridges classroom learning to real-world security operations.The internship will begin on 6/8/26 and end on 8/7/26. The internship position offers a compensation rate of $20 per hour for a 30-hour weekly commitment.What You'll DoShadow Tier 1 and Tier 2 SOC Analysts during live monitoring shifts to observe alert triage, investigation, and escalation workflows. The team will provide immersive labs trainingParticipate in daily SOC stand-ups, shift handoffs, and incident review sessions.Assist analysts with documenting investigation notes, building case timelines, and maintaining tickets in the SOC platform.Learn how TENEX.AI uses automation and AI agents to accelerate detection, triage, and response.Observe and assist with threat intelligence research, IOC enrichment, and writing internal knowledge-base articles.Support the SOC team with playbook reviews, runbook updates, and other documentation projects.Sit in on customer-facing communications (with appropriate supervision) to understand how analysts translate technical findings into clear customer updates.Complete a structured learning plan covering SIEM, EDR, SOAR, log analysis, and common attack techniques (MITRE ATT&CK).Present a capstone summary at the end of the internship of an investigation within SOC operations.What We're Looking ForCurrently in the final year of an undergraduate or graduate program, or a recent graduate (within the last 12 months), in Cybersecurity, Computer Science, Information Systems, or a related field.Genuine curiosity about security operations, threat detection, and how AI is reshaping the SOC.Foundational understanding of networking concepts (TCP/IP, DNS, HTTP) and operating systems (Windows, Linux).Familiarity with basic security concepts such as the CIA triad, common attack vectors, and the cyber kill chain.Strong written and verbal communication skills — you can explain what you observed and what you learned.Comfortable asking questions, taking notes, and learning in a fast-paced environment.Able to work on-site in our Overland Park, KS SOC for the full duration of the internship.Nice to HaveCoursework, lab experience, or personal projects involving SIEM tools, packet analysis, or CTF challenges.Entry-level certifications or progress toward them (CompTIA Security+, Network+, or similar).Basic scripting experience (Python, PowerShell, or Bash).Exposure to cloud platforms (AWS, Azure, or GCP).What You'll GainDirect mentorship from experienced SOC Analysts and security engineers.Hands-on exposure to a modern, AI-native MDR environment.A structured learning plan and capstone project you can showcase to future employers.Insight into the day-to-day reality of a career in security operations.