Lawrence Livermore National Laboratory

Kick-Start Your Tech Career
Will you come explore the future of the cyber world with us? Here’s how to apply for our paid internships during the summer months and throughout the academic year.

Our paid internship program will provide you with relevant and highly applicable experience solving critical, real-world problems, giving you the exciting opportunity to gain research skills and to work with the Lab’s outstanding science and engineering staff.

Interns hard at work!

When Does It Start?

The Cyber Defenders student internship program primarily runs from May through September, with start and end dates dependent on your individual school schedule. There are certain graduate student positions that are available during the academic school year and during winter break.

Who Is Eligible?

High school, undergraduate, and graduate students (including Ph.D. candidates) are eligible for the Cyber Defenders program. You must be a continuing student enrolled in an academic program for Fall 2016. Students should be studying or be interested in one or more of the following areas: computer science, computer engineering, electrical engineering, mathematics, information assurance, information technology (IT), visualization, political science, economics, international relations, or a related field of study.

How Do I Apply?

Click on the "How to Apply" button at the top of the page for detailed steps. You will be required to send in a current resume and should have references prepared to recommend you to the program. The application process opens in December and closes when all positions have been filled, as applications are processed in the order in which they arrive. Upon review, you may receive a request for additional information.


For questions about anything regarding the Cyber Defenders internship, please send an email to Evi Dube, Tencia Leon, or Tiffany Ashworth.

Desired Skills

Cybersecurity is a broad field and Cyber Defenders come from many disciplines and experiences. However, enthusiasm for addressing cyber security topics and a love for problem solving are some of the most important skills that one brings to the field. Excellent communication skills and initiative are also necessary for working cogently in groups and for summarizing technical contributions. Further desired technical skills include the following:

  • Ability to work under both Windows, Macintosh, or UNIX-variant operating systems.
  • Competency/experience in AT LEAST ONE of the following areas:
    • Developing software with either C++ or Java.
    • Data analysis algorithms, relational databases, and machine learning algorithms.
    • Network design, implementation, and administration; configuring firewalls; routers; switches; experience in providing strong network security.
    • Familiarity with file formats, data structures, and TCP/IP-based protocols; familiarity with hex-editor programs.
    • of security technologies such as intrusion detection, firewalls, and encryption.
    • Understanding of current legislation, applications of policies, and legal construct for cyber security and privacy.
    • Understanding of internet policy, telecommunications and information policy.
    • Knowledge of commercial cyber-security software applications.

A three-day competitive exercise called the "Tracer Fire Competition" is one of the highlights of the summer. Cyber Defenders complete a series of computer security challenges in the Laboratory's High Performance Computing Innovation Center.

Pictured: summer 2015 Cyber Defenders working together in collaboration lab area in the Cyber Defenders building.