IT Security Co-op (Drexel 2025)
Philadelphia, Pennsylvania, United States
Applications have closed
Security Risk Advisors
Security Risk Advisors offers Purple Teams, Cloud Security, Penetration Testing, Cyber Physical Systems Security and 24x7x365 Cybersecurity Operations. Based in Philadelphia, SRA operates across the USA, Ireland and Australia.JOB DESCRIPTION
SRA’s mission is to level up every day to protect our clients and their customers. This begins with our team members and their experience. SRA prides itself on maintaining a culture where team members have a shared sense of support and belonging, consistent with our It’s Personal company value. At SRA, we prioritize transparent career pathing, varied DEI programming and community groups, competitive benefits including mental health support, and an emphasis on a sustainable, healthy, and engaging work culture. SRA has twice been named a Best Place to Work by the Philadelphia Business Journal.
These Essential Functions, Requirements, and Skills are guidelines. If you are a candidate who does not meet this exact job description but can demonstrate excellent organization, attention to detail, professionalism, flexibility, and self-direction in your professional background, we hope you apply. SRA values a diverse workplace and strongly encourages women, people of color, LGBTQ+ individuals, people with disabilities, members of ethnic minorities, and veterans to apply.
Summary/Objective
The IT Security Co-Op will work with the IT Security Lead to operate the IT security function within SRA. The IT Security Co-Op will collaborate with other team members to provide timely solutions to user problems, provide information and recommendations regarding configurations and installations, and develop strategies for improving IT and security processes company wide.
Essential Functions
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
· Work queues and alerts in SRA’s internal Cyber Security Operations team (PHL0)
· Act as one of the primary analysts within SRA’s internal Cyber Security Operations team
· Design, deploy, engineer, and maintain SRA internal security solutions designed to secure SRA’s workforce.
· Operationalize the vulnerability management (VM) process to triage and patch system and network vulnerabilities.
· Research and conduct proof-of-concepts for new solutions that enable the appropriate security controls.
· Create and maintain technical documentation and procedures for security risks, operational decisions, and potential improvements.
· Identify and define system security requirements and maintain appropriate system patch levels.
· Review security posture of new infrastructure and assist with deploying in a secure configuration.
· Drive remediation from purple team and penetration testing activities.
· Work with vendors to troubleshoot issues or to analyze new products.
· Assist front-line technical support and education for those solutions to on-site and remote employees by diagnosing and resolving incidents related to security controls.
· Develop content (rules, automations, analytics, etc) in SRA’s internal SOC in order to disseminate to XDR client environments.
Work Environment
This job operates in a professional office environment in Center City Philadelphia, and all co-ops are expected to work in the office every day. This role routinely uses standard office equipment.
Physical Demands
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. While performing the duties of this job, the employee is regularly required to talk and hear; use hands to finger, handle, or feel; and reach with hands and arms. The employee frequently is required to stand and walk. This is a largely sedentary role.
Candidates with disabilities are encouraged to apply and email careers@sra.io with any questions. Reasonable accommodations may be made to enable disabled individuals to perform the essential functions of this role.
Position Type/Expected Hours of Work
This is a full-time position, and hours of work and days are Monday through Friday 8:30am to 5pm. Occasional evening and weekend work may be required as job duties demand.
Requirements
Required Education and Experience
· Punctuality and timely attendance to external client and internal stakeholder needs.
· A bachelor’s degree in information technology or similar field of study, or significant Information Technology training and experience.
· A passion for learning about IT systems and equipment.
· Enjoys working with others and teaching people to use IT systems and equipment.
· Excellent verbal and written communication skills.
· Ability to prioritize and manage multiple tasks concurrently.
· Excellent organizational skills.
Preferred Qualifications and Experience
· Residence in Eastern time zone preferred.
· AZ-900 or AZ-104 certifications preferred.
Other Duties
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
EEO Statement
Security Risk Advisors is an Equal Opportunity Employer and prohibits discrimination or harassment of any kind. All employment decisions at SRA are based on business needs, job requirements, and individual qualifications, without regard to race, color, sex, sexual orientation, gender identity or expression, age, religion, national origin, disability, marital or family status, veteran status, medical condition, or any similar category protected under federal, state, or local laws.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Pentesting SOC Teaching Vulnerabilities Vulnerability management XDR
Perks/benefits: Career development Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.