CrawlJobs Logo

It - Cyber Security Intern

bollingershipyards.com Logo

BOLLINGER MISSISSIPPI SHIPBUILDING LLC

Location Icon

Location:
United States , Mandeville

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a dedicated IT Intern to support Cybersecurity that is currently enrolled in an undergraduate or graduate program in Computer Science, Information Technology, or a related field. The candidate will assist in protecting systems, data, and users by supporting cybersecurity operations, compliance activities, and security awareness initiatives.

Job Responsibility:

  • Assist with monitoring security tools and alerts under supervision
  • Help maintain cybersecurity policies, procedures, and documentation
  • Support antivirus updates, patching, and access reviews
  • Assist with vendor security questionnaires and audits
  • Participate in security awareness and training initiatives

Requirements:

  • Must be currently pursuing or recently completed a degree in Computer Science, Information Technology, or a related field
  • High school diploma or GED required
  • Must be at least 18 years of age
What we offer:
  • Competitive Pay
  • Comprehensive Benefits Package
  • Career Development
  • Cutting-Edge Projects
  • Positive Work Environment & Company Values

Additional Information:

Job Posted:
March 01, 2026

Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for It - Cyber Security Intern

Head of Cyber Security Culture and Architecture

Grade 6 vacancy in the Information and Cyber Security Department. Responsible fo...
Location
Location
United Kingdom , Hanslope Park (Milton Keynes) or East Kilbride
Salary
Salary:
69500.00 - 90600.00 GBP / Year
allenlane.co.uk Logo
Allen Lane
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Enterprise Security Architecture: Leading the design and assurance of enterprise security architecture, applying recognised frameworks and principles
  • Technical Security Architecture: Applying security architectural principles to complex IT and operational technology (OT) systems
  • Policy and Standards: Providing subject matter expertise in developing and interpreting cyber and information security policies and standards
  • Information Security Culture: Baselining the future vision for the FCDO’s information and cyber security culture, defining and assuring delivery of change levers
  • Third Party Management: Leading the definition and assurance of cyber and information security requirements for third-party relationships
  • Management, Leadership and Influence: Embedding a security first culture and influencing behaviours at all levels
  • Must hold or be willing to obtain security clearance to DV level
  • Must have been resident in the UK for five out of the last ten years immediately prior to application
Job Responsibility
Job Responsibility
  • Define, lead and deliver, through their team, the FCDO’s secure architecture and its internal cyber security culture
  • Ensure secure design is embedded across systems and services while fostering a workforce that understands, values and upholds security principles
  • Lead a team of security architects who will influence technology delivery, organisational behaviours and leadership decision making
  • Ensure architecture, awareness and cultural resilience are delivered in a coordinated way
  • Work in partnership with business, digital and security stakeholders
  • Lead engagement and reporting for their workstreams
  • Represent the CISO at various HMG and external events where necessary
What we offer
What we offer
  • Civil Service pension scheme (employer contribution of 28.97%)
  • Annual leave starting at 25 days leave per annum
  • Location allowance of £1,750 (if based in Milton Keynes)
  • Specialist allowance of up to £10,800 per annum (subject to review)
  • Fulltime
Read More
Arrow Right

Cyber Security Architect

We are looking for an experienced Cyber Security Architect to lead security revi...
Location
Location
United Kingdom
Salary
Salary:
Not provided
experis.co.uk Logo
Experis
Expiration Date
July 31, 2026
Flip Icon
Requirements
Requirements
  • Active SC and NPPV Clearance is Necessary
  • Strong knowledge of enterprise security architecture, cloud security (Azure, AWS), and multi-tenant environments
  • Familiarity with Zero Trust, NIST, ISO 27001, and CIS benchmarks
  • Proficiency in identity management, network security, encryption, and secure onboarding processes
Job Responsibility
Job Responsibility
  • Assess and validate cloud tenant architectures for compliance with security policies and frameworks
  • Identify gaps in proposed designs and recommend enhancements to meet security baselines
  • Work closely with client security teams and internal architects to align on security objectives
  • Facilitate workshops and design reviews to ensure mutual understanding of requirements
  • Define and enforce security standards, patterns, and principles across all platforms
  • Ensure adherence to regulatory compliance and organizational security policies
  • Certify that platforms are fully secured and operational before onboarding activities
  • Implement controls for identity and access management, encryption, and monitoring
  • Conduct threat modeling and risk assessments for new tenants and onboarding processes
  • Provide mitigation strategies for identified vulnerabilities
Read More
Arrow Right

Senior Cyber Security Analyst

In the Bosch Cyber Security Organization, we coordinate the vulnerability manage...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree (Master/Diploma/PhD) in Information Security, Computer Science, Software Development, Electrical Engineering, Mathematics, or comparable field
  • Team player familiar with cooperation and delegation
  • Versatile and communicative individual who enjoys preparing and sharing information tailored to target audience
  • Strong technical background in security and several years of professional experience in multiple fields: IT Security, Cloud Security, Embedded Security, Industrial Control Systems (ICS), Industrial IoT (IIoT), Consumer IoT, Software Security and Security Research, Vulnerability Management process design and execution
  • Ideally basic knowledge in operational management of CSIRT, CERT, or Product-CERT
  • Love challenges while defining and implementing processes in new, effective, and user-oriented manner
  • Very good English written and spoken
  • German would be an important asset
Job Responsibility
Job Responsibility
  • Investigate and assess vulnerabilities within operational environment
  • Provide basis for prioritizing vulnerability remediation follow-up
  • Work closely with development and operations teams in Poland and tracking teams in India
  • Support further development of Enterprise Security Advisory Services
  • Track risks through vulnerabilities
  • Continuously identify process improvements for enhanced tool support
  • Coordinate implementation of improvements with international teams
  • Actively work as team to network with external stakeholders
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Professional support and knowledge sharing
  • Ongoing development opportunities in multinational environment
  • Broad access to professional trainings including language courses, conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits including MultiSport, shopping vouchers, cinema tickets
  • Prepaid Lunch Card
  • Fulltime
Read More
Arrow Right

Senior Cyber Security Analyst

In the Bosch Cyber Security Organization, we coordinate the vulnerability manage...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completed university degree (Master/Diploma/PhD) in Information Security, Computer Science, Software Development, Electrical Engineering, Mathematics, or a comparable field of study
  • Team player who is familiar with both cooperation and delegation
  • Versatile and communicative individual who enjoys preparing and sharing information tailored to the target audience
  • Strong technical background in security and several years of professional experience in multiple of the following fields: IT Security, Cloud Security, Embedded Security, Industrial Control Systems (ICS), Industrial IoT (IIoT), Consumer IoT, Software Security and Security Research, Vulnerability Management process design and execution
  • ideally basic knowledge in the operational management of a CSIRT, CERT, or Product-CERT
  • Love challenges, while defining and implementing processes in a new, effective, and user-oriented manner
  • Very good English, written and spoken
  • German would be an important asset
Job Responsibility
Job Responsibility
  • Investigate and assess vulnerabilities within their operational environment, providing the basis for prioritizing the follow-up of vulnerability remediation
  • Work closely with development and operations teams in Poland, as well as tracking teams in India, supporting the further development of our Enterprise Security Advisory Services and the tracking of risks through vulnerabilities
  • Continuously identify process improvements for enhanced tool support and coordinate their implementation with the respective international teams
  • Actively work as a team to network with external stakeholders
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December
  • Fulltime
Read More
Arrow Right

Cyber Security Analyst

Cyber security is critical to our work and in ensuring we deliver on our mission...
Location
Location
United Kingdom , Aldermaston near Reading
Salary
Salary:
Not provided
awe.co.uk Logo
AWE
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Growth mindset
  • Curiosity
  • Innovation
  • Resilience
  • Teamwork
  • Must be a British Citizen
Job Responsibility
Job Responsibility
  • Monitoring for external and internal threats
  • Hunting for potential threats
  • Responding to cyber incidents
  • Undertaking investigations
  • Working with cutting-edge tools
  • Diving into data
  • Collaborating with expert analysts
What we offer
What we offer
  • £23,500 + BENEFITS
  • 270 hours of annual leave
  • Every other Friday off work (nine-day fortnight)
  • Fulltime
Read More
Arrow Right

Cyber Security Engineer

Darumatic is an IT Consultancy and Recruitment Services Company that focuses on ...
Location
Location
Australia , Canberra
Salary
Salary:
Not provided
darumatic.com Logo
Darumatic
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Character clearance, including a police check
  • Negative Vetting level 1
  • Political neutrality
  • Australian citizen
  • Experience using Sentinel or a similar SIEM solution is essential
  • In-depth familiarity with the Australian Government Information Security Manual
  • Experience with security technologies such as endpoint protection, firewalls and IDS/IPS
  • Extensive experience in Windows, Linux, networking and system administration
  • Experience with security services in the cloud (Azure or AWS)
Job Responsibility
Job Responsibility
  • Detection and coordination of incident response to threats, both foreign and domestic, against critical electoral systems
  • Augmenting the existing operations team to assist in uplifting the existing capability
  • Maintenance of cyber security monitoring and analysis toolsets
  • Taking a lead role in the build of the cyber security architecture through consultation with client's internal teams to secure this architecture
  • Working primarily in the office
  • Ability to work shifts as required in response to cyber security incident, and also to support electoral events at key periods (e.g. close of rolls, polling day)
Read More
Arrow Right

Cyber Security Engineer - Data Encryption

Data Encryption and Compliance will be responsible for supporting the management...
Location
Location
United States , Isline, NJ, Columbus, OH, Chandler, AZ, or Westlake, TX
Salary
Salary:
Not provided
enormousenterprise.com Logo
Enormous Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent experience)
  • Basic understanding of data encryption concepts, security protocols, or related technologies
  • Strong analytical and problem-solving skills with an eagerness to learn and develop technical expertise
  • Familiarity with compliance and regulatory environments, particularly in financial services, is a plus
  • Excellent communication and collaboration skills
  • Experience: 9+ years
  • Data Encryption Management
  • Compliance and Risk Management
Job Responsibility
Job Responsibility
  • Assist in the implementation, maintenance, and support of encryption technologies to secure structured data at rest
  • Monitor encryption systems and processes to ensure optimal performance and security
  • Work with a variety of vendors to implement and manage encryption solutions
  • Support vendor assessments and ensure adherence to compliance and security requirements
  • Contribute to the development and integration of encryption tools and processes
  • Provide hands-on support for technical issues and enhancements
  • Assist with compliance-related activities, including audits, regulatory reporting, and maintaining documentation
  • Ensure all encryption practices align with industry standards, regulatory requirements, and internal policies
  • Work closely with senior engineers and leadership to support the team’s goals and objectives
  • Participate in training opportunities to develop expertise in data encryption technologies and compliance practices
Read More
Arrow Right

Cyber Security Engineer

We are looking for someone dynamic who can quickly adapt to new challenges and f...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
miniclip.com Logo
Miniclip
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 1 year of experience in SOC or similar cybersecurity role with exposure to advanced threat detection and analysis
  • Background in Computer Science, Information Technology, or a related field
  • Proficiency in SIEM platforms (e.g., Sentinel, Splunk, QRadar) and writing custom correlation rules
  • Hands-on experience conducting: Technical Software Security Risk Assessments
  • Vulnerability Assessments in web and/or mobile applications, and Physical and Wireless penetration testing
  • Document and report incidents/assessments/findings
  • Understanding of cybersecurity standards and frameworks (e.g., ISO27001, NIST, NIS2, OWASP)
  • Availability for work outside of regular hours on short notice to handle emergencies
  • A social and hard-working candidate who thrives in a team environment and is passionate about their work
  • Solid understanding of cyber security best practices and frameworks
Job Responsibility
Job Responsibility
  • Incident handling: Identifying, triaging, and investigating potential security incidents
  • Systems Administration: Understanding system internals and implementing effective countermeasures and remediation strategies on different operating systems
  • Computer Forensic Analysis: Possessing a background in utilizing diverse forensic analysis tools during incident response investigations to assess the scope and depth of compromise
  • Vulnerability Assessment: Review and validate vulnerability reports collected by our systems working closely with cross-functional core/development teams to prioritize and facilitate the remediation of identified vulnerabilities in a timely manner
  • Reporting and documentation: Develop and maintain accurate records of all the incidents, vulnerability reports, assessments, remediation efforts, ensuring clear documentation of findings and resolutions
  • Awareness: Promote security awareness within the organization by conducting training sessions, sharing insights on emerging threats, and fostering a culture of security consciousness
  • Threat Hunting: Performing proactive threat hunting across the group
  • Physical Security: Availability to travel through our different studios to identify physical vulnerabilities and propose remediation measures
Read More
Arrow Right