• User warning: The following module is missing from the file system: readonlymode. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1156 of /var/www/html/starling.sbs.arizona.edu/mig/ischool/includes/bootstrap.inc).
  • User warning: The following module is missing from the file system: readonlymode. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1156 of /var/www/html/starling.sbs.arizona.edu/mig/ischool/includes/bootstrap.inc).

Cybersecurity Intern

Deadline

Friday, July 7, 2023

Location

Tucson, Arizona

Sponsor Organization

The University of Arizona Security Operations Center

Description

Role Description

 
University of Arizona: Security Operations Center
 
This remote internship will begin August 2023
 
Students must be located in Tucson, Arizona or the surrounding area (Sierra Vista and Phoenix).
 
The purpose of the University of Arizona Security Operations Center (SOC) is to support the University of Arizona’s mission by protecting the confidentiality, availability, and integrity of its data and systems, and by assisting data owners in monitoring critical systems, and coordinating incident response activities.
 
1.     Monitoring and Detecting
2.     Communicating and collaborating
3.     Tracking and Managing Security Incidents
4.     Serving The University of Arizona community as subject matter experts as needed
 
Job Description:
 
The Information Security Office is looking to add student interns who wish to gain hands-on experience within the UArizona's SOC. The cybersecurity interns will work under the direction of the SOC team. These positions will involve documentation, analysis, investigation, incident response, network security monitoring, and administrative duties as assigned. Additionally, the interns will perform threat hunting by utilizing various data sources which are fed into a SIEM. The schedule will be set during the working hours of 9:00 AM to 5:00 PM, Monday-Friday. Students will be expected to work 15-25 hours/week.
 
Responsibilities include, but are not limited to:
 
·        Record and track IT security incidents, including but not limited to compromised accounts, email threats/phishing, and abuse reports from various sources
·        Assist with provisioning and tuning of security monitoring tools
·        Perform threat hunting to detect and eradicate threats
·        Review and update documentation for policies, procedures, standards and guidelines
·        Assist with applications/tools including but not limited to SIEM, IPS, Netflow, e-mail gateway protection, and DLP tools
·        Review third-party vulnerability assessment data to identify weak system configuration
 
Learning Objectives and Outcomes:
 
By the end of the semester, the students will gain:
·        Thorough understanding of the Incident Response Process
·        Familiarity with security appliances and products
·        Professional Development
·        Time management
·        Communication
·        Problem solving
·        Prioritization
·        Customer Service
·        Familiarize self with logs from various security appliances and be able to identify anomalies
·        Apply what was learned to the real world
 
Minimum Qualifications:
 
·        Must be located in Tucson, Arizona or the surrounding area (Sierra Vista and Phoenix) in order to pick up and drop off laptops
·       This is a remote opportunity; students must have access to reliable internet access and computing resources
·       This is an unpaid opportunity
·       Students can take the course for credit. Please coordinate with your advisor
·       Students are expected to work between 15-25 hours per week M-F (SOC hours are from 9-5)
·       Must be a current University of Arizona student studying Cyber Operations, Computer Science, Intelligence and Information Operations, or a related degree
 
Preferred Qualifications/Knowledge:
 
·        Incident Handling Process
·        Networking concepts and protocols (TCP/IP, UDP, DNS, DHCP, HTTP, etc.)
·        Security related technologies: Firewalls, Network Intrusion Detection systems, SIEM
·        CIA Triad
·        NIST Cybersecurity Framework
·        Basic understanding of data analysis
·        Information Security Best Practices
 
Please Submit:
 
·        Cover Letter
·        Resume 
In Person