Welcome to the BWAM Job Board

Cybersecurity Intern

Cambridge Associates

Cambridge Associates

Arlington, VA, USA
Posted on Dec 19, 2025

Firm Overview:

Cambridge Associates (“CA”) is a leading global investment firm. CA’s goal is to help endowments & foundations, pension plans, and ultra-high net worth private clients implement and manage custom investment portfolios that generate outperformance so that they can maximize their impact on the world. Cambridge Associates delivers a range of services, including outsourced CIO, non-discretionary portfolio management, and investment consulting.

Headquartered in Boston, Massachusetts, CA has offices in key markets in North America, the United Kingdom, Europe, Asia, and Oceania. Our worldwide teams ensure our clients benefit from decades of global presence, local expertise, and relationships with the top global investment managers across the world. For more information, please visit www.cambridgeassociates.com.

Job Description Summary:

POSITION SPECIFICS:
Location of position: Arlington, VA
Program Length: 10-week program from mid-June to mid-August (rising seniors preferred)
Required for application: Resume, Cover Letter and Unofficial Transcript
Hours/Compensation: Summer Analysts are expected to work 40 hours per week and are competitively compensated
Office Requirement: Summer Analysts are expected to be onsite 2 days a week and can work from home 3 days a week

The Analyst will provide a range of analytical skills to help drive security initiatives. The Analyst will work with security partners and internal technical teams to define security policies, standards, and procedures, deliver superior quality advice to our customers, and participate in initiatives implementation to ensure successful outcomes.

Job Description:

Responsibilities

The Analyst (intern) will hold some of the following responsibilities during their internship:

  • Acquire broad understanding of the organization technology and information systems
  • Acquire knowledge of the organization’s compliance requirements
  • Define corporate security policies; work with technical teams on creating and maintaining network and infrastructure security procedures
  • Work on business intelligence and analytics, data visualization, and data analysis projects.
  • Participate in developing security configuration standards for network, servers, desktops, laptops, tablets, mobile phones, etc.
  • Work with technical teams and security partners on designing and implementing processes for security monitoring, vulnerability management, incident management, and data loss prevention
  • Provide recommendations on governance programs such as configuration and change management, risk management, and compliance
  • Develop remediation plans for security risks and vulnerabilities
  • Participate in performing security assessments and assurance reviews
  • Participate in performing data classification and data discovery
  • Participate in developing security awareness training materials for end users and technical teams

Knowledge/Skills/Abilities

Candidates with skills / abilities / knowledge in some of the areas listed are preferred. It’s most important that candidates can effectively speak to their prior experiences and university learning objectives, relating those to their potential to be effective as a contributor. Although some of these areas are technical in nature, candidates from a wide variety of university backgrounds have been successful as interns and full time employees within the team.

  • Knowledge and experience with computer systems, applications, development, testing methodologies, technology, and data sciences
  • Knowledge of industry standard methodologies and best practices (i.e., ITIL, System Development Life Cycle, etc.)
  • Knowledge of cybersecurity, security frameworks and controls, security technologies and architecture
  • Able to conduct interviews and develop documentation for project efforts
  • Facilitation skills for bringing multiple groups together to build project scope and consensus
  • High-level of knowledge, experience and success with writing and reviewing test cases
  • Able to work independently with minimal direction and guidance from project lead, consultant staff and manager.
  • Strong process analysis and problem-solving skills
  • Strong communication skills, including the ability to communicate effectively in both formal and informal contexts in a fashion tailored for the audience
  • Affinity for technical writing and presenting – ability to formally document requirements, reach agreements with others, and explain detailed requirements to others as needed
  • Capacity to discern patterns and interdependencies in complex business processes
  • Capacity to focus on details, while effectively managing ambiguity
  • Strong research skills and desire for learning and experimentation
  • Ability to work cooperatively in a collegial environment
  • Actively seeking a bachelor’s degree

Knowledge and skills in the following technical areas will be a plus

  • Cloud computing, AWS and/or Azure
  • SaaS models
  • Data science (analytics, visualization techniques)
  • Identity and access management principles
  • Penetration testing and vulnerability testing
  • Firewalls, IDS/IPS, network access control and network segmentation
  • Router, switch and VLAN security; wireless security
  • Programming and database query (e.g., SQL) languages, Power Automate programming
  • Application security
  • Encryption technologies
  • Artificial Intelligence LLM and Agentic AI scripting

Base salary range for this role:

Pay Range Minimum:

0

Pay Range Maximum:

0

In addition to the listed salary range, this position is eligible for an annual performance-based bonus and a comprehensive, competitive benefits package. Actual placement within the stated salary range will be determined based on factors such as skills, experience, and qualifications, as well as internal equity.

The firm is committed to the concept and practice of equal employment opportunity and will not discriminate against any employee or applicant on the basis of race, color, religion, age, sex, national origin, sexual orientation, gender identity, disability, or veteran status. It is expected that all employees will follow a similar policy toward their co-workers.