About The Position

Zscaler is a pioneer and global leader in zero trust security. The world’s largest businesses, critical infrastructure organizations, and government agencies rely on Zscaler to secure users, branches, applications, data & devices, and to accelerate digital transformation initiatives. Distributed across more than 160 data centers globally, the Zscaler Zero Trust Exchange platform combined with advanced AI combats billions of cyber threats and policy violations every day and unlocks productivity gains for modern enterprises by reducing costs and complexity. Here, impact in your role matters more than title and trust is built on results. We believe in transparency and value constructive, honest debate—we’re focused on getting to the best ideas, faster. We build high-performing teams that can make an impact quickly and with high quality. To do this, we are building a culture of execution centered on customer obsession, collaboration, ownership and accountability. We champion an “AI Forward, People First” philosophy to help us accelerate and innovate, empowering our people to embrace their potential. If you’re driven by purpose, thrive on solving complex challenges and want to make a positive difference on a global scale, we invite you to bring your talents to Zscaler to help shape the future of cybersecurity. Role We are looking for a Cyber Incident Response/Customer Security Operations - SkillBridge Intern to join our Other R&D team. This is a remote role reporting to the Senior Manager Threat Hunting. The security landscape is always shifting and introducing new adversaries. The Red Canary CIRT operates 24/7 to track down threats using the entirety of our customer’s data and deliver fast and practical detections to our customers. Together, we create a customer-centric culture that fosters success, adoption, and continuous growth.

Requirements

  • Cybersecurity operational experience with a focus in Managed Detection and Response.
  • Must be located in the United States during the SkillBridge program.
  • At least 180 continuous days of active service with 180 days or fewer remaining prior to your date of discharge.
  • Approval from your unit commander.
  • MOU must be approved and submitted before start.

Nice To Haves

  • Experience with EDR tools.
  • Experience conducting Incident Response activities.
  • Malware/Threat Analysis and Detection Engineering experience.

Responsibilities

  • Use Red Canary’s detection platform to analyze EDR telemetry, alerts, and log sources across several detection domains including Endpoint, Identity, SIEM, and Cloud/SaaS.
  • Publish threats for customers using concisely-written communication while effectively conveying key and important indicators.
  • Research coverage opportunities to create new detectors and tune existing ones through detector development.
  • Improve the CIRT workflow through orchestration and automation.

Benefits

  • Various health plans
  • Time off plans for vacation and sick time
  • Parental leave options
  • Retirement options
  • Education reimbursement
  • In-office perks, and more!
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service