Cytomate
Internship - Attack Simulation & Threat Detection
CytomateQatar16 days ago
Full-timeEducation, Training

Company Description

Cytomate is the first cybersecurity company in the MENA region, based in Doha, Qatar, developing proprietary technology. We specialize in offensive security, offering solutions such as Red Teaming, Pen Testing, and Reverse Engineering. Our flagship product, Breach+, is a comprehensive Breach and Attack Simulation (BAS) platform that helps organizations identify security gaps and prioritize investments. Additionally, we offer Sarab, a deception product utilizing honey tokens, and SnipeX, an AI-based tool that generates and mutates payloads to bypass security controls.


Role Description

We are looking for 2 motivated Cybersecurity Interns with a keen interest in attack simulation, threat detection, and security engineering. The interns will gain hands-on experience with Sigma and YARA rules, SIEM/SOAR platforms, and client engagement. This role is ideal for candidates who are eager to learn how adversary simulation, detection logic, and mitigation strategies are applied in real-world environments.


Key Responsibilities


  • Assist in conducting attack simulations to test security controls.
  • Learn how to write and apply Sigma and YARA rules for detection and malware identification.
  • Support the security team in analyzing results and documenting mitigation strategies.
  • Help prepare technical reports and executive summaries for clients.
  • Participate in client meetings to observe and contribute to the explanation of findings.
  • Research emerging threats and detection techniques to support ongoing projects.


Learning Outcomes


By the end of the internship, the intern will:


  • Understand attack simulation concepts and their role in security validation.
  • Gain practical experience with Sigma, YARA, and SIEM platforms.
  • Learn how to map findings to MITRE ATT&CK and recommend mitigations.
  • Improve technical writing skills by contributing to client reports.
  • Develop client-facing communication skills through guided interactions.


Mandatory Requirements


  • Basic understanding of cybersecurity concepts (malware, IOCs/IOAs, SIEM, threat detection).
  • Familiarity with attack simulation or strong interest in adversary emulation.
  • Knowledge (or willingness to learn) Sigma, YARA, and security log analysis.
  • Strong written and verbal communication skills.
  • Ability to work in a team and show a learning mindset.


Preferred (Not Mandatory)


  • Exposure to MITRE ATT&CK framework.
  • Familiarity with any SIEM/SOAR platform.
  • Academic or personal projects related to threat detection or malware analysis.

Key Skills

Ranked by relevance