Where are IST students completing their internships?
Displaying 726 - 750 of 5325
Company Name | Position Title | Major | Option | Job Description | State | Industry Type | Sem & Yr | |
---|---|---|---|---|---|---|---|---|
Nisos | Open Source/Targeting Intelligence Analyst | SRA | ICS | Brief Role Summary: Utilization of Linux based OS platforms to conduct Open-source research and targeting validation. Conducting DNS searching/monitoring using Ubuntu Open-source research platforms. Deep & Dark Web monitoring using Tor based webpages to view forums or reporting's. Create security risk mitigation briefings/reports to provide to contracted companies. Assessment of external network hygiene, including asset discovery, potential undocumented public IP spaces, misconfigurations, and indicators of compromise. Analysis of the non-traditional business risk of the target organization, including potential suspicious financial activity, intellectual property theft, criminal activity, and threats of physical harm. Baseline for hunting active and latent threats and correlating findings across client requests, expert hypotheses, and landscape threat patterns |
Other | Spring 2024 | ||
Paragone Solutions, Inc. | Cross Domain Solutions Consultant | IST | Provide subject matter expertise on Cross Domain Solutions that are part of on going company efforts. | DC | Aerospace & Defense | Spring 2024 | ||
The CELL Lab | SRA | ICS | My job, in relation to SRA/IST, is to craft narratives that relate to the field and use to them to teach users how to use the Linux command line. It will have a focus on using more game-like structures and understanding user retention to incentivize an intrinsic desire to continue playing/learning. The overall goal of the project is to teach a greater, virtual audience, how to learn cybersecurity and how to inspire them to continue learning. | PA | NA | Spring 2024 | ||
State farm | CRT-3 | IST | Not Provided | Handle escalated claims and assist with advanced policy applications, demonstrating expertise in cybersecurity measures. - Utilize independent judgment for decision-making within cybersecurity and compliance standards. - Serve as a technical resource for complex policy concerns, involving multiple systems within the realm of information technology. - Collaborate with underwriters on cybersecurity-related matters, addressing Agency and Agency Leadership concerns. - Coordinate workflow, quality audits, and compliance reviews, focusing on cybersecurity protocols. - Conduct complex auditable policy functions, including phone audits, with a specific emphasis on information security. - Explain complex billing notices with a focus on safeguarding sensitive information and data. - Analyze and contribute to the development and training of new procedures, ensuring alignment with IT and insurance best practices. | Insurance | Spring 2024 | ||
United States Navy | Information System Security Officer | IST | ITINT | Recognizes microcomputer operating systems (i.e. MS-DOS, Windows NT, UNIX, and Novell Netware) vulnerabilities and performs corrective actions to ensure maximum system availability. Assists the Information Systems Security Manager (ISSM) with the System Security Plan (SSP) and systems accreditation in accordance with IN-225. Uses commercial off the shelf software and operating system specific tools to perform virus protection and detection, system backups, data recovery, and auditing functions. Creates, configures, and maintains user and group accounts across multiple operating systems. Assesses protocol and proxy service vulnerabilities and their relation to firewalls. Develops and implements solutions, with regard to protocol and proxy service vulnerabilities, guarding against hostile attempts of compromise or inadvertent disclosure of sensitive material. Verifies and writes Access Control Lists (ACL) and programs screening routers. | DC | Government | Spring 2024 | |
CACI | Intelligence Threat Analyst | SRA | IAM | Work closely with a team to identify capabilities and vulnerabilities of targeted enemy organizations; identify trends, patterns, and key nodes; and highlight their relationships to the targeted enemy networks. | VA | Aerospace & Defense | Spring 2024 | |
PSU | Company name:UNIESCORT Consulting Inc | HCDD | During my internship as a Data Analyst at UNIESCORT Consulting Inc., my primary responsibilities encompassed data analysis, Customer Relationship Management (CRM) system development, data processing, debugging IT systems, and optimizing system web pages. These responsibilities were closely aligned with my academic knowledge. In designing CRM systems and optimizing web interfaces, I employed human-centered design principles to ensure that technological solutions met end-user needs. Moreover, in data processing and system debugging, I applied technical skills and methodologies from information science to ensure data accuracy and efficient system operation. | Education | Spring 2024 | |||
United States Coast Guard | C5I (Command, Control, Communications, Computer, Cyber and Intelligence) Deputy | CYAOP | I am responsible for the administration, installation, training, maintenance, service, and policy for all cyber and communications related gear for the Coast Guard in the 14th District comprising the areas and assets from Hawaii to Japan. | HI | Government | Spring 2024 | ||
BAE Systems | Applications Engineer - Customer Technical Support Manager | SRA | ICS | Application engineers serve as the link between clients, sales, and engineering teams. Using customer insights and sales data, I help leverage this information to architect or revamp, develop, test, and deploy software solutions with a strong emphasis on security considerations. Offering technical support and expertise while engaging in thorough application testing and actively responding to customer feedback. My responsibilities extend to installations and maintenance activities, often involving sales presentations and demonstrations with a security-centric approach. Customer analysis is a fundamental aspect of the Security Risk Analysis domain, where professionals craft applications tailored to address security needs and devise innovative solutions to prevalent security challenges. In this context, I help conduct prototyping applications and code reviews to ensure the security robustness of products. Tasks include debugging, testing, coding, improvement, and redesigning, primarily focusing on resolving security-related issues. This involves providing clients with updated software that addresses security vulnerabilities and enhances overall system security—additionally, performing customer installations and collaborating closely with customer service teams to fortify the security posture of the implemented solutions. |
VA | IT Specialties | Spring 2024 | |
ThermoFisher Scientific | RPA Developer | IST | ISDEV | I will be trained to use the Robotic Process Automation software UiPath and will then use the software to design automated functions for several business processes that the company has designated as suitable for automation. For example, the first process I will be designing is a function that will monitor a mailbox for requests from customers for Safety Data Sheets. The process will parse the email for the product in question, send a request to the company's server for the Safety Data Sheet, and email it back to the requestor. | Medical/Healthcare Institutions/R&D | Spring 2024 | ||
FFC | CTO | IST | Not Provided | The main responsibility is to set the technology vision and strategy. Here are some other main responsibilities: Leadership and Team Management Research and Development IT Governance Budget Management Project Management Stakeholder Communication Risk Management |
IL | Other | Spring 2024 | |
Westway | Personnel Security Specialists | CYAOP | Process onboarding clients via web services, validate certificates, create associations between emails and accounts, resetting passwords, fixing printers, setting up computer workstations via towers and monitors along with keyboards and mouse, performing computer security by granting cyber privileges to specific users based on the level of accesses. | VA | Other | Spring 2024 | ||
US Department of Commerce | RPA Process Developer Intern | IST | ISDEV | Selected interns with participate in an RPA project, whose purpose is to design and create attended bots for a large number of end-users. | Government | Spring 2024 | ||
Corbin Public Library | IT Specialist | IST | Not Provided | Manage Network. Information Security. Write and manage policies. Train and advise staff. | KY | Other | Spring 2024 | |
Take2 Consulting | Threat Intelligence Analyst | SRA | Not Provided | Support intelligence functions, analytics, and cyber investigations and operations. In the role you will work to advance collection operations by identifying new collection opportunities with potential to address identified source coverage gaps. Analysts conducting target analysis/development functions will apply indicators and characteristics of known threat variables to a defined targeting need and use analytic techniques and methodologies to advance investigative or collection actions, or to recommend new investigative or collection actions. Additionally, analysts assigned target analysis and/or development tasks and projects will evaluate, analyze, and synthesize large quantities of data and information from one or multiple sources into high quality, fused targeting/intelligence products. | VA | Government | Spring 2024 | |
Phoenix Contact USa | Business Intelligence Intern | DATSC | My job is to help compile key performance indicators, survey results, and other customer success metrics to support the Voice of the Customer Scorecard and also be responsible for creating visualizations of these measurements, to be included in Executive summaries and presentations. | Other | Spring 2024 | |||
US Army Cadet Command | Cadet | CYAOP | Leadership Training | KY | NA | Spring 2024 | ||
Xiamen Jinseyangguang Commerce and Trade Company | IT support and information security intern | SRA | ICS | As an IT Support and Information Security Intern, I am primarily responsible for assisting with technical issues and ensuring the confidentiality, integrity, and availability of data and systems. | Retail & Wholesale Distribution | Spring 2024 | ||
Highmark Health | IT Infrastructure Analyst | CYAOP | Create develop and maintain server daily operation and security. Ensure that all DoD security regulations are met on all servers in environment. Secure and maintain security of entire insurance and hospital infrastructure. Continued maintenance of interconnectivity between payer and provider servers |
Medical/Healthcare Institutions/R&D | Spring 2024 | |||
Verizon | Fiber Customer Support Analyst | IST | ISDEV | Answering incoming calls from customers with order inquiry and/or trouble reports. Providing customers with service support for Voice, Data, and Video services and features within the fiber network. Performing analysis and isolation of trouble conditions and creating and sorting trouble reports. Utilizing knowledge of communication and networking components to provide customers with service support and configuration of customer equipment. Communicating clearly and professionally, delivering technical/industry information in a manner appropriate to the audience. |
MD | Telecommunications | Spring 2024 | |
SHELT | SOC intern | SRA | ICS | Responsibilities: -Monitor security tools and systems, including SIEM, IDS/IPS, and firewalls. -Perform security incident analysis and response, including triage and escalation. -Work with various security scopes, including network security, application security, and threat intelligence. -Participate in security audits and assessments, including vulnerability assessments and regulation-based audits. -Analyze security logs and reports to identify potential security incidents. -Participate in incident response exercises and tabletop simulations. |
Other | Spring 2024 | ||
PSU | Lab Research | CYAOP | I will be going over serval projects related to my major. Like creating an encrypted chatting app in Java, building a network with Cisco Package Tracer, and analyzing data with LLVM. | IT Specialties | Spring 2024 | |||
21st Signal Brigade (U.S. Army) | Cyber Non-Commissioned Officer | SRA | ICS | Scanning networks/systems for vulnerabilities, eliminating threat vectors, analyzing cyber security posture of subordinate units, automation, ensuring end user privacy and evaluating cyber security risks. | MD | Government | Spring 2024 | |
The Peruvian Bank Association | Assistant of Technological Solutions | IST | ISDEV | As a Technological Solutions Assistant within the IT department of the PBA, I play a pivotal role in facilitating the seamless coordination and efficient management of the software product development processes. Working closely with the Chief of Technological Solutions, my responsibilities extend across various domains crucial to the software product lifecycle. Primarily, our area, Technological Solutions, serves as a linchpin between independent teams in the IT department. These include developers, IT operations and integrations, marketing, sales, legal, and upper management. My engagements entail active participation in meetings aimed at supplier coordination, internal troubleshooting, and fostering effective communication channels across departments. Additionally, I am required to perform creative activities in the form of product design which involves a considerable amount of understanding of the software involved, telecommunications, marketing efforts, and of course the customer’s necessity. I contribute to optimizing the workflow of our area by implementing agile methodologies such as Kanban boards and Design Thinking principles. By championing continuous development practices, I ensure our team remains at the forefront of evolving organizational methodologies. |
Financial Markets & Banking Services | Spring 2024 | ||
US Department of State with the US Embassy in London | Software Developer | IST | ISDEV | As a Software Developer, I will be responsible for designing, coding, testing, and implementing software solutions. I will work closely with cross-functional teams to deliver high-quality software products that meet or exceed customer expectations. Responsibilities 1. Collaborate with product owners and other stakeholders to understand project requirements and objectives. 2. Design, develop, and maintain software applications, ensuring scalability, performance, and code quality. 3. Write clean, efficient, and well-documented code using best practices. 4. Participate in code reviews to ensure code quality and provide constructive feedback to team members. 5. Debug and resolve software defects and issues in a timely manner. 6. Stay up to date with industry trends and technologies to ensure our software remains innovative and competitive. 7. Work in a Scrum development environment, participating in sprint planning, daily stand-ups, and other agile ceremonies. |
Government | Spring 2024 |