My Cybersecurity Internship Journey: Lessons Learned and Impact Made
For students entering cybersecurity, internships are one of the best ways to build practical experience before stepping into a full-time role. Between 2023 and 2025 I completed three: a Cybersecurity Analyst role at Leonardo DRS, a cybersecurity internship at Dark Wolf Solutions, and an Information Security Operations internship at Seagate Technology. Each role covered a different area of the discipline: SOC operations, compliance, and detection engineering.
Leonardo DRS: Where It Started
My first role was a Cybersecurity Analyst internship in Dayton, where I was embedded within the CERT team supporting network and endpoint security operations. Being part of the CERT team meant working directly on active security operations: triaging alerts in Splunk, analyzing logs, and escalating verified threats. The volume was high and the environment operated at a consistent pace, and it established early that most SOC work is pattern recognition and structured triage, not reactive incident response.
Phishing investigation was among the most hands-on work. Proofpoint generated the initial alerts; from there, I'd trace the sending infrastructure, extract IOCs, and work the incident through to close. That repeated process contributed to a 40% reduction in mean time-to-close. On the network side, Zscaler Web Gateway provided visibility into outbound traffic, which was useful when correlating anomalies during threat hunting. Carbon Black Cloud and Microsoft Defender covered endpoint telemetry. Between the two, it was generally possible to reconstruct process execution and determine origin.
Participating in the annual tabletop exercise was a different kind of experience. That year's scenario was a ransomware incident, and working through it with the full team, working through detection decisions, containment steps, escalation paths, and recovery coordination, made clear how much of incident response depends on organizational process rather than technical execution alone.
Dark Wolf Solutions: The Compliance Side
Dark Wolf was a different area of security entirely. The work centered on Risk Management Framework activities: reviewing and assessing controls aligned with NIST SP 800-53 and supporting system authorization. It was process-driven and documentation-heavy rather than operational. I came in with limited exposure to compliance work and left with a clearer understanding of why the framework exists. An organization with strong technical controls but weak documentation is difficult to audit, and that gap creates real exposure.
Seagate Technology: Going Deeper on Detection Engineering
The Seagate Technology internship was structured differently from the previous two. I worked directly alongside security engineers, which gave me a clearer picture of what that role looks like in practice and confirmed it as the direction I want to go. Being embedded with people doing detection engineering and incident response at an enterprise scale made the career goal concrete rather than abstract.
The work itself centered on a Microsoft Sentinel SIEM deployment: building automated workflows that generated tickets in the IT case management system and writing KQL analytic detection rules that extended threat coverage across the environment. In CrowdStrike Falcon, I created and tuned Indicators of Attack and Indicators of Compromise to improve alert fidelity.
I also handled endpoint incident response directly, identifying and removing malware from affected systems. Working through that process end-to-end several times gave the incident response lifecycle a concreteness that theoretical study doesn't provide.