Apply for Fall 2024 Info Security Student Analyst #45514

This job posting is no longer active.

Is your contact info correct?

Employers will use these contact methods to respond to your application, so it is important that they are accurate.
Tip: Be sure you write an effective resume and cover letter. See templates and tips here, or visit the Career Center in ST 204.

Fall 2024 Info Security Student Analyst

  • Category: Professional Internship Program
  • Position Type: Student Hourly
  • Posted on: February 28, 2024
  • Open until: filled
  • Work Hours: Up to 20 hours per week
  • Wage: $10/hr for undergraduate students, $12/hr for graduate students
  • Location: Cedar City, UT

Description:

*To qualify for this internship, you must already be accepted into the Professional Internship Program and must receive an eligibility letter. To be considered for this position, it is essential to complete the application process through this form: https://forms.gle/XcweL1jPy3xP7q1z9 *

Please note that candidates without the Program Eligibility Letter will not be considered for this position. You should include your Eligibility Letter in the “Other file” section of this application.

The Information Security Office is seeking a motivated individual to assist in activities to protect the university from cyber threats.

Duties may include:

  • Responding to cyber threats
  • Analyzing network traffic
  • Monitoring server logs
  • Reviewing security alerts
  • Testing existing controls
  • Evaluating/Implementing open-source security tools
  • Reviewing training and newsletter content

Student employees receive significant on-the-job training and experience in the cybersecurity industry.

Qualifications:

  • Experience with the installation and management of Windows/Linux servers.
  • Experience with networking protocols, such as TCP/IP, DNS, and HTTP.
  • Ability to work well with others and complete projects in a timely manner.
  • Self-motivated to research technologies to assist SUU's network security.
  • (Preferred) Ability to automate repetitive processes by using scripting languages such as Bash, Python, or PowerShell.
  • (Preferred) Basic knowledge of offensive techniques in order to help design preventive/detective security controls.
  • (Preferred) Experience with Docker Containers.
  • (Preferred) Relevant certifications such as Certified Ethical Hacker or Security+.