Cyber Security Intern

Rand Technology LLCIrvine, CA
36d

About The Position

The Cyber Security Intern will gain hands-on experience in protecting organizational systems, networks, and data from cyber threats. This role provides exposure to various aspects of information security including threat detection, vulnerability assessment, security monitoring, incident response, and compliance. The intern will work alongside experienced IT and security professionals to support the company's cybersecurity initiatives while developing practical skills in a real-world business environment.

Requirements

  • Currently enrolled in a Bachelor's or Master's degree program in Cyber Security, Information Security, Computer Science, Information Technology, or related field
  • Completed coursework in cybersecurity, networking, or information systems
  • Junior, Senior, or Graduate student preferred
  • Minimum GPA of 3.0 preferred
  • Basic understanding of cybersecurity principles and concepts
  • Fundamental knowledge of networking (TCP/IP, DNS, firewalls, VPNs)
  • Familiarity with operating systems (Windows, Linux)
  • Basic understanding of security frameworks (NIST, ISO 27001, CIS Controls)
  • Knowledge of common cyber threats and attack vectors
  • Coursework or projects involving security tools and technologies
  • Basic proficiency with security tools (antivirus, vulnerability scanners, etc.)
  • Familiarity with scripting or programming (Python, PowerShell, Bash) a plus
  • Understanding of virtualization and cloud concepts
  • Basic knowledge of database security
  • Experience with security labs or capture-the-flag (CTF) exercises a plus
  • Strong analytical and problem-solving abilities
  • Excellent attention to detail
  • Eager to learn and develop new skills
  • Good communication skills (written and verbal)
  • Ability to work independently and collaboratively
  • Strong work ethic and professional demeanor
  • Discrete and trustworthy with sensitive information
  • Time management and organizational skills

Nice To Haves

  • Security certifications or actively pursuing (Security+, CEH, CISSP, etc.)
  • Participation in cybersecurity competitions or CTF events
  • Experience with penetration testing or ethical hacking concepts
  • Knowledge of compliance frameworks (GDPR, HIPAA, PCI-DSS, SOC 2)
  • Familiarity with security tools (Wireshark, Nmap, Metasploit, Burp Suite)
  • Personal projects or lab environments demonstrating security interests
  • Previous internship or work experience in IT or security
  • Understanding of secure coding practices
  • Membership in cybersecurity clubs or organizations (e.g., CyberPatriot, ISSA)

Responsibilities

  • Assist in monitoring security information and event management (SIEM) systems
  • Review security alerts and logs for potential threats or anomalies
  • Help identify and document security incidents and suspicious activities
  • Support the security operations team with daily monitoring tasks
  • Participate in threat intelligence gathering and analysis
  • Assist with vulnerability scanning and assessment activities
  • Help analyze scan results and prioritize remediation efforts
  • Document vulnerabilities and track remediation progress
  • Support patch management processes
  • Research emerging vulnerabilities and security threats
  • Participate in security awareness and training initiatives
  • Assist with security policy and procedure documentation
  • Support security audit and compliance activities
  • Help evaluate and test security tools and technologies
  • Contribute to security improvement projects
  • Assist in responding to security incidents under supervision
  • Help document incident details, timelines, and actions taken
  • Support forensic analysis and investigation activities
  • Participate in incident response exercises and tabletop simulations
  • Learn and apply incident response procedures
  • Assist with user access reviews and privilege audits
  • Help maintain documentation for compliance requirements
  • Support identity and access management (IAM) processes
  • Participate in security configuration reviews
  • Help ensure adherence to security policies and standards
  • Research cybersecurity best practices and industry standards
  • Assist in creating and updating security documentation
  • Prepare reports and presentations on security topics
  • Stay informed on current cyber threats and attack techniques
  • Document security tools, processes, and procedures
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service