RSM US LLP · 3 hours ago
Cyber Testing Intern - Summer 2026
RSM US LLP is the leading provider of professional services to the middle market globally, empowering clients and people to realize their full potential. They are currently seeking Consulting Interns for their Security, Privacy and Risk Consulting practice, where the candidate will assist in addressing clients' information security and data privacy needs.
AccountingConsultingFinancial Services
Responsibilities
Assess security of client networks, hosts, and applications
Determine technical, business impact and likelihood of identified security issues and provide remediation guidance to clients
Perform analysis and testing to verify the strengths and weaknesses of mobile and web applications and web services (SOAP, WSDL, UDDI)
Perform Internet penetration testing using blackbox and whitebox methodologies
Review application code, system configurations and device configurations using manual and automated techniques
Measure and report clients’ compliance with established industry or government requirements
Identify leaked client data on open and closed (Deep and Dark Web) sources
Perform analytical investigations into specific threat actors, ransomware, and campaigns
Communicate technical findings to a non-technical audience effectively
Create and review threat intelligence programs for clients using established intelligence models
Work with RSM consulting professionals with a variety of credentials including Certified Ethical Hacker (CEH), Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified Threat Intelligence Analyst (CTIA®)
Qualification
Required
Pursuing a B.A. or B.S. degree or equivalent from an accredited university by the time employment commences with a major in Computer Science, Information Technology, Information Systems Management, Information Security, intelligence, digital forensics, cybersecurity or other similar degrees
Technical background in computer science and cybersecurity related fields
Strong knowledge of computer network technologies, protocols/topologies, digital forensics and endpoint protection, or threat intelligence
Software development, programming and/or scripting experience (Perl, Python, C, Java, PHP, ASP, etc.)
Ability to track threat actors across Dark Web criminal forums and marketplaces and ability to communicate findings
Ability to track malware campaigns and understand adversarial activity from an intelligence perspective
Basic understanding of intelligence, including intelligence lifecycle, Kill Chain, Diamond model, and Priority Intelligence Requirements
Proven track record of an analytical and curious mindset in problem solving
The ability to interpret and convey technical information through written and oral communications to all levels of technical aptitude, including senior management
High degree of integrity and confidentiality, as well as ability to adhere to company policies and best practices
Possess a strong internal drive and motivation for continuous improvement
A minimum 3.0 GPA is preferred
Preferred
Practical hands-on or lab experience with IT infrastructure components such as servers, firewalls, IDS systems and other network infrastructure components
Practical hands-on or lab experience with security applications, such as a AppScan, Metasploit, BurbSuite, Nessus, Social Engineering Toolkit, Kali Linux, etc., or other commercial and public domain security tools
Operating system configuration and security experience (HP-UX, Linux, Solaris, AIX, etc.)
Configuration and security experience with web servers and web applications (Apache HTTP/Tomcat, Microsoft IIS, Sun One, Oracle iPlanet, IBM WebSphere, etc.)
Database Configuration and Security experience (MySQL, Microsoft SQL, IBM DB2, Sybase, Oracle, etc.)
Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking
Internship or overall experience with threat intelligence vendor or familiarity with various threat intelligence tools and platforms
Company
RSM US LLP
Stay Alert: Avoid Recruitment Scams Across industries, cybercriminals are posing as company recruiters using fake job postings and employment offers to trick people into providing personal information or payment.
Funding
Current Stage
Late StageLeadership Team
Recent News
FoodProcessing.com
2025-09-13
2025-08-29
Company data provided by crunchbase