Wal-Mart-posted about 1 month ago
$19 - $35/Yr
Intern
Onsite • Bentonville, AR
5,001-10,000 employees
General Merchandise Retailers

Each summer, we select the best and brightest to look under the hood of the worlds largest retailer at our Walmart Home Offices across multiple locations. During the 11-week program, our interns work directly with teams who are changing the way the world shops. This is the beginning of what could be an exciting career with Walmart! The intern experience includes: An impactful individual project designed to align to your skillsets and interests Direct access to leadership across the enterprise Executive-led speaker sessions with insightful Q&A Community outreach events Networking and social events Learning & development opportunities targeting both hard and soft skills Deep dives into different areas of our business Time management and leadership development as a full-time associate An in-depth look at our Belonging, Culture of Belonging () practices Compensation and housing assistance provided Roles & Responsibilities: Walmart's Cybersecurity team is responsible for securing our digital ecosystem, minimizing risk across the enterprise, and defending against cyberthreats. Our goal is to keep the data of Walmart's customers and associates secure. If you're a tried-and-true innovator, maker, disruptor, or mold breaker, then this is the space for you! As a Cybersecurity Intern, you will have the opportunity to work in a specific capability/discipline based on your skillset, role availability and more. The list below includes but is not limited to the different capabilities/disciplines and roles you could be considered for in Cybersecurity. We encourage you to familiarize yourself with each area to gain a better understanding of the potential opportunities. Network Engineer II, Information Security: Resolves network security infrastructure issues by troubleshooting and diagnosing through root cause analysis. Enhances network security infrastructure by monitoring network performance. Installs network security infrastructure; assists team members with changes; works with suppliers and senior team members to review system performance. Assesses potential network security issues and identifies solutions. Conducts audits on network rules, alerts, and monitors on a scheduled basis. Assists in network security design. Systems and Infrastructure Engineer II, Information Security: Resolves security system issues (e.g., configuration and management of security systems, spam filtering, identify and access management) by troubleshooting and diagnosing through root cause analysis. Assesses potential security system issues and identifies solutions. Enhances security systems by monitoring and maintaining security products. Installs security systems; assists team members with changes; works with suppliers and senior team members to review system performance; identifies and recommends improvements to system alerts and monitors. Conducts audits on security systems. Assists in network security design. Application Security Engineer II: Collaborates closely with product and software development teams to design secure applications and services Develops and implements security solutions that adhere to the SDLC and security methodologies Conducts application threat modeling using industry methodologies Utilizes application security metrics to identify gaps in secure development practices Cyber Intelligence Engineer II: Monitors cyber threats by leveraging industry standard tools, custom tools, and best practices. Collects, analyzes, and correlates data points between various feeds, tools, and personal interactions. Analyzes data to determine the need for further action. Discerns patterns of complex threat actor behavior. Communicates an understanding of current and developing cyber threats. Develops written intelligence briefings for various levels of stakeholders. Penetration Testing Engineer II: Performs basic security testing utilizing preconfigured tools and scripts Assists in the review and analysis of issues with security controls and identified vulnerabilities Applies security severity ratings with guidance Documents security findings in workflow reporting tools Builds knowledge of security testing tools Intrusion Analyst II: Monitors, analyzes, and remediates cybersecurity events by adhering to defined operating procedures. Works problem tickets and outstanding cases. Documents analytical steps during alert research and remediation. Communicates with stakeholders during event troubleshooting and research. Drafts and reviews standard operating procedures for new cybersecurity alerts. Supports security operations center processes and procedures. Modifies alert logic for higher fidelity and identifies new risk detections. Improves the quality of analytical capabilities by remediating missing or failed standard operating procedures and critical cybersecurity alerts. Data Assurance Engineer II: Monitors data movement by utilizing data loss prevention tools. Analyzes alerts and identifies correlating data points between various feeds, tools, and personal interactions. Analyzes data to determine the need for further action. Develops and implements data loss prevention system solutions by assisting Technical Experts in setting technical direction.

  • Resolves network security infrastructure issues by troubleshooting and diagnosing through root cause analysis.
  • Enhances network security infrastructure by monitoring network performance.
  • Installs network security infrastructure; assists team members with changes; works with suppliers and senior team members to review system performance.
  • Assesses potential network security issues and identifies solutions.
  • Conducts audits on network rules, alerts, and monitors on a scheduled basis.
  • Assists in network security design.
  • Resolves security system issues (e.g., configuration and management of security systems, spam filtering, identify and access management) by troubleshooting and diagnosing through root cause analysis.
  • Assesses potential security system issues and identifies solutions.
  • Enhances security systems by monitoring and maintaining security products.
  • Installs security systems; assists team members with changes; works with suppliers and senior team members to review system performance; identifies and recommends improvements to system alerts and monitors.
  • Conducts audits on security systems.
  • Assists in network security design.
  • Collaborates closely with product and software development teams to design secure applications and services
  • Develops and implements security solutions that adhere to the SDLC and security methodologies
  • Conducts application threat modeling using industry methodologies
  • Utilizes application security metrics to identify gaps in secure development practices
  • Monitors cyber threats by leveraging industry standard tools, custom tools, and best practices.
  • Collects, analyzes, and correlates data points between various feeds, tools, and personal interactions.
  • Analyzes data to determine the need for further action.
  • Discerns patterns of complex threat actor behavior.
  • Communicates an understanding of current and developing cyber threats.
  • Develops written intelligence briefings for various levels of stakeholders.
  • Performs basic security testing utilizing preconfigured tools and scripts
  • Assists in the review and analysis of issues with security controls and identified vulnerabilities
  • Applies security severity ratings with guidance
  • Documents security findings in workflow reporting tools
  • Builds knowledge of security testing tools
  • Monitors, analyzes, and remediates cybersecurity events by adhering to defined operating procedures.
  • Works problem tickets and outstanding cases.
  • Documents analytical steps during alert research and remediation.
  • Communicates with stakeholders during event troubleshooting and research.
  • Drafts and reviews standard operating procedures for new cybersecurity alerts.
  • Supports security operations center processes and procedures.
  • Modifies alert logic for higher fidelity and identifies new risk detections.
  • Improves the quality of analytical capabilities by remediating missing or failed standard operating procedures and critical cybersecurity alerts.
  • Monitors data movement by utilizing data loss prevention tools.
  • Analyzes alerts and identifies correlating data points between various feeds, tools, and personal interactions.
  • Analyzes data to determine the need for further action.
  • Develops and implements data loss prevention system solutions by assisting Technical Experts in setting technical direction.
  • Must be enrolled in a bachelors or masters degree program currently
  • Expected graduation date between December 2026-August 2027
  • 0-2 years of full-time relevant experience (excludes internship and research-based roles)
  • Compensation and housing assistance provided
  • competitive pay
  • other great benefits for a happier mind, body, and wallet!
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service