You are viewing a preview of this job. Log in or register to view more details about this job.

Cybersecurity Intern, Cybersecurity Operations - CSOC

Internship Summary:  
This internship will provide training and practical experience in cybersecurity operations. This will include cybersecurity incident monitoring and response, cybersecurity threat hunting and remediation, and exposure to cyber-attack simulations used to identify gaps and vulnerabilities, testing new cybersecurity solutions and services, assisting state agencies with adherence to new cybersecurity policies, regulations, and processes. The experience will benefit scholars planning a career in the cybersecurity field, specifically in public service or governmental sector.  
This opportunity is best suited for scholars who enjoy thinking critically and strive to find new ways to resolve complex issues, while working as part of a team to help keep the State of Florida Enterprise secure and resilient. Interns will gain practical work experience to augment their education and career preparation and will be mentored by a full-time professional manager.   

Duties and Responsibilities:
Conduct incident response activities (information gathering, log analysis, indicators of compromise (IoC) searches, network traffic analysis, inter-agency, and external partner coordination, etc.), track cyber incidents and compile IoC information to conduct threat hunting activities, conduct research and analysis of threat intelligence, determine exploitable vulnerabilities existing in the enterprise, and determine possible scope and impact in the event of an attack.  
 
Scholars will assist with the following: 
  • Incident monitoring and response. 
  • Threat hunting – proactively searching across  technology resources to Identify possible malicious activity based on IoC. 
  • Coordinate incident response and threat remediation with agencies. 
  • Take corrective actions – perform functions to Isolate resources, remediate threats, and resolve incidents. 
  • Document incident response actions and additional recommendations. 
  • Participate in hands-on training of cybersecurity solutions.  
  • Coordinate cybersecurity solution implementation with agencies – develop timelines and plans for roll-out.  
  • Engage in implementation with agencies – to the extent required, assist agencies in solutions implementation. 
  • Troubleshoot implementation issues – Assist agencies in resolving issues with the solutions and implementation. Engage partners as needed.  
  • Document implementation status – Maintain implementation documentation to reflect the status of implementation. 
  • Document implementation process for specific solutions – record and archive a step-by-step guide for solution implementation for future use. 
  • Research vulnerabilities and exploits – conduct regular research on current cyber-attacks and record pertinent information such as threat actor details, tactics, techniques, and procedures (TTPs), attack vectors, behaviors, etc. 
  • Determine threat landscape of enterprise – Conduct vulnerability scans against systems and resources and determine exploitable vulnerabilities. 
  • Related duties as required. 

Knowledge, Skills, and Abilities:
  • Basic understanding of cybersecurity concepts. 
  • Basic understanding of information systems and computer networking. 
  • Basic knowledge of cybersecurity tools such log analysis solutions, anti-virus/extended detection and response solutions, security information and event management (SIEM), intrusion detection and prevention systems (IDS/IPS). 
  • Basic understanding of network architecture and interconnecting systems (routers, switches, firewalls, demilitarized zone (DMZ), servers, etc.). 
  • Basic understanding of cybersecurity threats and vulnerabilities. 
  • Familiarity with cybersecurity frameworks and regulatory/compliance standards (NIST CSF, ISO, HIPAA, PCI DSS, etc.). 
  • Exposure to governance, risk and compliance (GRC) solutions and procedures. 

Preferences:
  • Exposure to vulnerability management and vulnerability assessment tools. 
  • Exposure to penetration testing procedures and solutions. 
  • Understanding of project management techniques and exposure to  technology project implementation. 
  • Knowledge of the software development lifecycle and exposure to the implementation of  technology (especially cybersecurity) solutions. 

Minimum Qualifications:
  • Student classification of junior, senior, graduate, or recently graduated is required. 
  • Two Semester commitment is required. 
  • Declared major field of study from the list below is required. 
  • Student must be in good academic standing. 
  • U.S. citizenship is required. 
  • Candidates are required to successfully undergo a criminal background check and complete CJIS certification which requires fingerprinting. 
  • This is an in-office position. Students are required to work onsite in the FL[DS] office in Tallahassee, FL.  

Compensation:
Hourly Rate: Compensation will be determined based on qualifications and experience.  
Housing and Travel Expenses: Considered based on circumstance. 

Fields of Study:
Cybersecurity, Computer Science, Information Technology.