CW Security Operation Center Engineer Intern

Blue Cross and Blue Shield of LouisianaBaton Rouge, LA
3d

About The Position

We take great strides to ensure our employees have the resources to live well, be healthy, continue learning, develop skills, grow professionally and serve our local communities. We invite you to apply for a career with Blue Cross. Residency in or relocation to Louisiana is preferred for all positions. What This Team Does The Security Operations Center (SOC) team protects the organization by monitoring systems for security threats, identifying potential intrusions, and responding to suspicious activity. The team stays current on cybersecurity tools and trends to help keep data and systems secure. As a SOC Engineer Intern, you’ll gain hands‑on exposure to real‑world cybersecurity operations and learn how security teams detect, analyze, and respond to threats.

Requirements

  • Junior or Senior undergraduate student, graduate student, or recent graduate
  • Pursuing (or recently completed) a degree in: Computer Science Cybersecurity Or a related technical field
  • GPA Preferred: 3.0+ Minimum: 2.5 cumulative GPA
  • Basic knowledge of information technology, cybersecurity concepts, or security tools preferred
  • Strong analytical and problem‑solving skills
  • Ability to think critically and identify patterns or issues
  • Clear written and verbal communication skills
  • Comfortable learning new technologies and tools
  • Working knowledge of Microsoft Office, including: Word Excel PowerPoint
  • Spring & Fall semesters: 20 hours per week
  • Summer: 30–35 hours per week

Nice To Haves

  • Self‑motivated and eager to learn in a fast‑paced environment
  • Adaptable and comfortable working with changing priorities
  • Team‑oriented with a collaborative mindset
  • Professional and curious about cybersecurity best practices

Responsibilities

  • Help gather and analyze information to identify potential intrusion attempts
  • Assist with monitoring the security environment using various security tools and techniques
  • Review and monitor system and application logs
  • Use correlation and monitoring software to identify patterns or anomalies
  • Learn about existing security technologies, tools, and emerging cybersecurity trends
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service