About The Position

Steampunk is looking for a Technical Cybersecurity Intern to join the Office of the CIO. In this position, you will join a high performing team developing solutions to empower our employees. You will work across Steampunk to develop requirements and implement cybersecurity solutions and processes. Sample projects might include developing procedures for handling incidents; creating and tuning analytic rules in Microsoft Sentinel SIEM for detecting potential incidents; automating incident responses in Microsoft Sentinel using automation rules and playbooks/Logic Apps; and assisting to improve monitoring/incident response across multiple cloud platforms (i.e., Azure, AWS, etc.). We are looking for an individual with an appetite for taking on new challenges and solving complex problems with new innovations. Be an agent of change on a team committed to achieving client-focused, mission-driven excellence.

Requirements

  • Currently pursuing a Bachelors or Masters degree in a relevant subject area
  • Rising college junior or senior
  • Minimum overall GPA of 3.0
  • Strong interpersonal, written and communication skills
  • Excellent teambuilding and collaboration skills with cross-functional teams
  • Ability to learn new skills, tools, technology and scripting/programming languages
  • Resourceful in overcoming obstacles
  • Understanding of the Agile software lifecycle
  • Understanding of cybersecurity incident handling and response

Nice To Haves

  • Understanding of vulnerability management, malware analysis, and/or digital forensics preferred
  • Experience with scripting languages (such as python, bash, or PowerShell) and/or creating automated workflows (e.g., Logic Apps)
  • Experience with operating systems including MacOS and Windows
  • Experience with cloud technologies and networking
  • Experience with System Administration
  • Experience with query languages (such as SQL or Kusto Query Language) preferred
  • Local to the DMV Area

Responsibilities

  • Work with stakeholders to develop and document user stories
  • Participate in our Agile Scrum Team where you will be responsible for developing and demonstrating your efforts
  • Assist in developing incident handling procedures for specific types of incidents
  • Assist in automating incident responses using Microsoft Sentinel automation rules and playbooks (i.e., Logic Apps)
  • Assist in development and tuning of SIEM analytic rules using Kusto Query Language (KQL) to detect potentially malicious activities from log data
  • Assist in assessing and improving visibility over multiple cloud-based platforms (e.g., Azure, AWS, etc.)
  • Assist in validating vulnerability management for MacOS/Windows devices and implementing new configurations to improve security
  • Assist in development of security processes, procedures, and supporting technologies
  • Continually experience new and engaging opportunities, challenging work, flexibility, career sponsorship and mentoring, and recognition for your contributions
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service