Where are IST students completing their internships?
Displaying 651 - 675 of 5225
Company Name | Position Title | Major | Option | Job Description | State | Industry Type | Sem & Yr | |
---|---|---|---|---|---|---|---|---|
Healthy Acres, LLC. | Automation Intern | SRA | ICS | assisting to upgrade their IT infrastructure and implementing an IT security plan to help meet their requirements to bring in automation and AI to traditional technology processes. Assisting their Systems Administrator developing a security plan to improve infrastructure and network security due to the importance of protecting our food source. | CA | Other | Spring 2024 | |
Boss Property Management Group LLC | Office Administrator | SRA | ICS | Responsibilities: ● Computer Technician & It Help Desk Support -Install and update computer hardware and software systems on a combination of 20+ computers, printers, and VoIP Phone Systems. - Troubleshoot operating systems, external devices, and software failures. - Walk clients through technical issues via phone and email. ● Web Development - Update website data on Wordpress through embedding custom HTML and CSS ● Networking - Run shielded CAT6 throughout a 1,500 sqft multi level office building. - Research switches and routers to develop a functional ethernet system based on business needs. - Configuring VLAN and DHCP Pool in Cisco Command Line Interface. - Traceroute, install and configure Access Points - Troubleshoot ethernet ports, patch panels, and connectivity using RJ45 Network Tester and WireShark. - Develop comprehensive network diagrams and flowcharts. ● Cyber Security - Train coworkers on cybersecurity best practices. - Implement end user administrative hierarchy. - Run routine antimalware scans on business devices. - Configure website accessibility for end users within the network. - Develop comprehensive Risk Analysis Reports and Incident Response Plans. - Monitor cloud data. - Implement routine incremental backups to an external hard drive. ● Financial / Property Management - Manage association's finances including forensic auditing, monthly reconciliations, annual budgeting payroll, and daily withdrawals/deposits. |
PA | Consulting | Spring 2024 | |
with professor Kaamran Raahemifar | student | IST | ITINT | I will be working on the initial phase of developing an applicating | NA | Spring 2024 | ||
Lockheed Martin | Defensive Cyber Engineer | CYAOP | Responsibilities • Provide rotating shift support for a team of 6 Defensive Cyber Engineers working a 24/7 operation • Provide systems and architecture expertise for Defensive Cyber Operations to meet Cybersecurity mission execution on SBIRS operational assets • Assist Defensive Cyberspace Operations and Mission Defense Team in the identification, containment, and response to cyber incidents • Evaluate and analyze system architecture and security design as they pertain to the Cyber domain • Apply Cyber Security Engineering to improve the processing, configuration, transport, and usability of Cyber Security data used for analysis • Provide configuration and audit support to LogRhythm and other deployed security tools • Support peer reviews of policies and guidance as they relate to the DCO mission • Support working group meetings with the customer, as well as weekly briefs of DCE activities • Have frequent collaboration with customer stakeholders as well as working closely with site personnel • Assist in cyber risk assessment activities including threat modeling, vulnerability analysis and analysis of mitigation solutions • Coordinate with Cyber, System Architects and Developers to provide support to the development of security solutions • Employ cyber security methods, techniques, tools, and capabilities • This is for a Mission Essential role requiring potential holiday commitments if assigned and/or on call • Willing to work a rotating shift schedule as required (shift premium) • Experience briefing high level customer stakeholders with cyber security concerns and remediation tactics • Experience with responding to cyber incidents from detection through remediation • Intuitive and proactive self-starter that''''s accountable and mission focused |
CO | Aerospace & Defense | Spring 2024 | ||
Penn State | IT Service Desk Support Specialist | CYAOP | Identifying and helping to resolve many IT-related issues while creating an environment founded on teaching and learning and supporting our campus-wide printing services and computer labs found on the University Park campus. | PA | IT Specialties | Spring 2024 | ||
Nisos | Open Source/Targeting Intelligence Analyst | SRA | ICS | Brief Role Summary: Utilization of Linux based OS platforms to conduct Open-source research and targeting validation. Conducting DNS searching/monitoring using Ubuntu Open-source research platforms. Deep & Dark Web monitoring using Tor based webpages to view forums or reporting's. Create security risk mitigation briefings/reports to provide to contracted companies. Assessment of external network hygiene, including asset discovery, potential undocumented public IP spaces, misconfigurations, and indicators of compromise. Analysis of the non-traditional business risk of the target organization, including potential suspicious financial activity, intellectual property theft, criminal activity, and threats of physical harm. Baseline for hunting active and latent threats and correlating findings across client requests, expert hypotheses, and landscape threat patterns |
Other | Spring 2024 | ||
Paragone Solutions, Inc. | Cross Domain Solutions Consultant | IST | Provide subject matter expertise on Cross Domain Solutions that are part of on going company efforts. | DC | Aerospace & Defense | Spring 2024 | ||
The CELL Lab | SRA | ICS | My job, in relation to SRA/IST, is to craft narratives that relate to the field and use to them to teach users how to use the Linux command line. It will have a focus on using more game-like structures and understanding user retention to incentivize an intrinsic desire to continue playing/learning. The overall goal of the project is to teach a greater, virtual audience, how to learn cybersecurity and how to inspire them to continue learning. | PA | NA | Spring 2024 | ||
State farm | CRT-3 | IST | Not Provided | Handle escalated claims and assist with advanced policy applications, demonstrating expertise in cybersecurity measures. - Utilize independent judgment for decision-making within cybersecurity and compliance standards. - Serve as a technical resource for complex policy concerns, involving multiple systems within the realm of information technology. - Collaborate with underwriters on cybersecurity-related matters, addressing Agency and Agency Leadership concerns. - Coordinate workflow, quality audits, and compliance reviews, focusing on cybersecurity protocols. - Conduct complex auditable policy functions, including phone audits, with a specific emphasis on information security. - Explain complex billing notices with a focus on safeguarding sensitive information and data. - Analyze and contribute to the development and training of new procedures, ensuring alignment with IT and insurance best practices. | Insurance | Spring 2024 | ||
United States Navy | Information System Security Officer | IST | ITINT | Recognizes microcomputer operating systems (i.e. MS-DOS, Windows NT, UNIX, and Novell Netware) vulnerabilities and performs corrective actions to ensure maximum system availability. Assists the Information Systems Security Manager (ISSM) with the System Security Plan (SSP) and systems accreditation in accordance with IN-225. Uses commercial off the shelf software and operating system specific tools to perform virus protection and detection, system backups, data recovery, and auditing functions. Creates, configures, and maintains user and group accounts across multiple operating systems. Assesses protocol and proxy service vulnerabilities and their relation to firewalls. Develops and implements solutions, with regard to protocol and proxy service vulnerabilities, guarding against hostile attempts of compromise or inadvertent disclosure of sensitive material. Verifies and writes Access Control Lists (ACL) and programs screening routers. | DC | Government | Spring 2024 | |
CACI | Intelligence Threat Analyst | SRA | IAM | Work closely with a team to identify capabilities and vulnerabilities of targeted enemy organizations; identify trends, patterns, and key nodes; and highlight their relationships to the targeted enemy networks. | VA | Aerospace & Defense | Spring 2024 | |
PSU | Company name:UNIESCORT Consulting Inc | HCDD | During my internship as a Data Analyst at UNIESCORT Consulting Inc., my primary responsibilities encompassed data analysis, Customer Relationship Management (CRM) system development, data processing, debugging IT systems, and optimizing system web pages. These responsibilities were closely aligned with my academic knowledge. In designing CRM systems and optimizing web interfaces, I employed human-centered design principles to ensure that technological solutions met end-user needs. Moreover, in data processing and system debugging, I applied technical skills and methodologies from information science to ensure data accuracy and efficient system operation. | Education | Spring 2024 | |||
United States Coast Guard | C5I (Command, Control, Communications, Computer, Cyber and Intelligence) Deputy | CYAOP | I am responsible for the administration, installation, training, maintenance, service, and policy for all cyber and communications related gear for the Coast Guard in the 14th District comprising the areas and assets from Hawaii to Japan. | HI | Government | Spring 2024 | ||
BAE Systems | Applications Engineer - Customer Technical Support Manager | SRA | ICS | Application engineers serve as the link between clients, sales, and engineering teams. Using customer insights and sales data, I help leverage this information to architect or revamp, develop, test, and deploy software solutions with a strong emphasis on security considerations. Offering technical support and expertise while engaging in thorough application testing and actively responding to customer feedback. My responsibilities extend to installations and maintenance activities, often involving sales presentations and demonstrations with a security-centric approach. Customer analysis is a fundamental aspect of the Security Risk Analysis domain, where professionals craft applications tailored to address security needs and devise innovative solutions to prevalent security challenges. In this context, I help conduct prototyping applications and code reviews to ensure the security robustness of products. Tasks include debugging, testing, coding, improvement, and redesigning, primarily focusing on resolving security-related issues. This involves providing clients with updated software that addresses security vulnerabilities and enhances overall system security—additionally, performing customer installations and collaborating closely with customer service teams to fortify the security posture of the implemented solutions. |
VA | IT Specialties | Spring 2024 | |
ThermoFisher Scientific | RPA Developer | IST | ISDEV | I will be trained to use the Robotic Process Automation software UiPath and will then use the software to design automated functions for several business processes that the company has designated as suitable for automation. For example, the first process I will be designing is a function that will monitor a mailbox for requests from customers for Safety Data Sheets. The process will parse the email for the product in question, send a request to the company's server for the Safety Data Sheet, and email it back to the requestor. | Medical/Healthcare Institutions/R&D | Spring 2024 | ||
FFC | CTO | IST | Not Provided | The main responsibility is to set the technology vision and strategy. Here are some other main responsibilities: Leadership and Team Management Research and Development IT Governance Budget Management Project Management Stakeholder Communication Risk Management |
IL | Other | Spring 2024 | |
Westway | Personnel Security Specialists | CYAOP | Process onboarding clients via web services, validate certificates, create associations between emails and accounts, resetting passwords, fixing printers, setting up computer workstations via towers and monitors along with keyboards and mouse, performing computer security by granting cyber privileges to specific users based on the level of accesses. | VA | Other | Spring 2024 | ||
US Department of Commerce | RPA Process Developer Intern | IST | ISDEV | Selected interns with participate in an RPA project, whose purpose is to design and create attended bots for a large number of end-users. | Government | Spring 2024 | ||
Corbin Public Library | IT Specialist | IST | Not Provided | Manage Network. Information Security. Write and manage policies. Train and advise staff. | KY | Other | Spring 2024 | |
Take2 Consulting | Threat Intelligence Analyst | SRA | Not Provided | Support intelligence functions, analytics, and cyber investigations and operations. In the role you will work to advance collection operations by identifying new collection opportunities with potential to address identified source coverage gaps. Analysts conducting target analysis/development functions will apply indicators and characteristics of known threat variables to a defined targeting need and use analytic techniques and methodologies to advance investigative or collection actions, or to recommend new investigative or collection actions. Additionally, analysts assigned target analysis and/or development tasks and projects will evaluate, analyze, and synthesize large quantities of data and information from one or multiple sources into high quality, fused targeting/intelligence products. | VA | Government | Spring 2024 | |
Phoenix Contact USa | Business Intelligence Intern | DATSC | My job is to help compile key performance indicators, survey results, and other customer success metrics to support the Voice of the Customer Scorecard and also be responsible for creating visualizations of these measurements, to be included in Executive summaries and presentations. | Other | Spring 2024 | |||
US Army Cadet Command | Cadet | CYAOP | Leadership Training | KY | NA | Spring 2024 | ||
Xiamen Jinseyangguang Commerce and Trade Company | IT support and information security intern | SRA | ICS | As an IT Support and Information Security Intern, I am primarily responsible for assisting with technical issues and ensuring the confidentiality, integrity, and availability of data and systems. | Retail & Wholesale Distribution | Spring 2024 | ||
Highmark Health | IT Infrastructure Analyst | CYAOP | Create develop and maintain server daily operation and security. Ensure that all DoD security regulations are met on all servers in environment. Secure and maintain security of entire insurance and hospital infrastructure. Continued maintenance of interconnectivity between payer and provider servers |
Medical/Healthcare Institutions/R&D | Spring 2024 | |||
Verizon | Fiber Customer Support Analyst | IST | ISDEV | Answering incoming calls from customers with order inquiry and/or trouble reports. Providing customers with service support for Voice, Data, and Video services and features within the fiber network. Performing analysis and isolation of trouble conditions and creating and sorting trouble reports. Utilizing knowledge of communication and networking components to provide customers with service support and configuration of customer equipment. Communicating clearly and professionally, delivering technical/industry information in a manner appropriate to the audience. |
MD | Telecommunications | Spring 2024 |