Cyber Security Intern - Blue Team

South Africa / Johannesburg, ZA / Cape Town, ZA-%LABEL POSITION TYPE REMOTE ANY%

Cyberlogic

We’re a managed services provider that transforms businesses to perform at their best, with cutting-edge tech and solutions that make sense.

View all jobs at Cyberlogic

Apply now Apply later

JOB TITLE:

Cyber Security Intern – Blue Team

LOCATION:

Remote

ABOUT CYBERLOGIC:

Cyberlogic is a trusted Managed Solutions Provider with offices in South Africa, Mauritius, and the UK. Serving a diverse range of clients, spanning numerous industries, including the international maritime sector, Cyberlogic specialises in IT leadership, cyber security, cloud solutions, and business intelligence. For almost three decades, Cyberlogic has been committed to enabling digital transformation through delivering unquestionable value.

Our delivery focus has enabled us to build up a national and international footprint of loyal clients that rely on us to provide transparent, open guidance to improve their processes, grow their businesses, and secure their data.

Cyberlogic is part of the Hyperclear Technology group, which boasts a diverse technology offering including robotic process automation (RPA), business process management (BPM) data analytics, and decisioning technology.

Through our non-profit, R4C (Ride for a Child), we partner with Bright Start Education Foundation, an organisation empowering deserving learners from underprivileged communities, providing holistic support and guidance throughout their educational careers.​

OUR VALUES:

  • We challenge ourselves to be more AWESOME
  • We are driven to KEEP learning and EVOLVING
  • We look beyond symptoms to identify and RESOLVE ROOT CAUSES
  • We hold each other accountable through CANDID and constructive FEEDBACK
  • We respect and care for each other and know we will only SUCCEED if we work AS A TEAM
  • We CARE deeply ABOUT the success of CYBERLOGIC
  • We FINISH WHAT WE START
  • We always GIVE OUR BEST even if it means putting in the hard yards
  • We KEEP THINGS SIMPLE

PURPOSE OF POSITION:

As a Cyber Security Intern, you will immerse yourself in the fundamentals of cyber security while working alongside experienced professionals. Your primary responsibilities will include providing essential support to the Cyber Security team, assisting with basic tasks, and actively participating in hands-on learning opportunities.

KEY RESPONSIBILITIES:

Problem Solving and Implementing Security Measures: 

  • Collaborate with team members to identify and resolving issues relating to security measures.
  • Shadow team members in the implementation of security protocols and tools following established procedures.
  • Assist the team in analysing and addressing gaps within tools, systems, and procedures to strengthen security frameworks under guidance of senior team members.
  • Shadow team members during security audits and assist in evaluating current security measures.

Monitoring and Incident Response: 

  • Conduct regular reviews of tickets and alerts.
  • Respond to security alerts and threats identified through the ticketing system within the SLA timeframe.
  • Collaborate with Analysts and Senior Analysts to escalate complex or high-priority security incidents for further analysis and resolution.
  • Regularly monitor SOC tools to ensure smooth operations and identify any potential issues.

Client Communication and Support:

  • Shadow team members in responding to client inquiries and incidents via email.
  • Assist in identifying and escalating complex security tickets to the appropriate team members upon the team leader's approval within the SLA timeframe.

Security Investigations:

  • Gather and analyse information related to security breaches, utilizing research to support investigative efforts.
  • Support with the identification and analysis of potential security threats, working alongside team members to assess risks and vulnerabilities.
  • Provide support in implementing remediation measures to address identified security threats, following established procedures and guidelines under the guidance of senior team members.
  • Monitor affected devices or accounts for any signs of ongoing threats or suspicious activities, escalating findings to senior team members for further investigation as necessary.

Auditing and Reporting:

  • Participate in audits of client environments, assisting in data collection and identifying any vulnerable systems.
  • Provide support with reviewing audit findings and comparing the findings with information documented in the ticketing system under the guidance of the senior team members.
  • Provide support in resolving discrepancies or mismatches identified during audits.
  • Assist in preparing reports summarising audit results for clients.

Documentation:

  • Assist with compiling clear and user-friendly "how-to" guides for common technical procedures.
  • Seek guidance from the team leader's and then present documented guides to the team for their review and feedback.
  • Maintain and amend documents, under the team leader's guidance, based on feedback and changes to ensure accuracy and accessibility for future reference.
  • Get documents signed-off by team leader.

Continuous Learning:

  • Stay up-to-date with industry trends and best practices to enhance technical expertise.
  • Engage in hands-on learning by shadowing experienced Cyber Security Team members.
  • Attend CyberLearning sessions on a weekly basis.
  • Attend Qualys and Darktrace training sessions to gain access to the platform.
  • Continuously upskill in the cyber security domain.
  • Conduct regularly presentations on assigned topics regularly and collaborate with fellow interns.

Project Participation:

  • Assisting the team in project-related activities.

Vulnerability Remediation:

  • Support with software upgrade processes by assisting with planning and documentation.
  • Assist in implementing security configuration changes under the guidance of the Cyber Security Technician and Specialist.
  • Shadow the Cyber Security Technician and Specialist when advising clients.

Script Creation for Automation:

  • Assist in creating scripts for PowerShell, Bash, or Terminal to automate changes on devices.
  • Shadow the testing of scripts in sandboxes to analyse their behaviour.

Vulnerability Research:

  • Assist in conducting research on identified vulnerabilities.

KEY REQUIREMENTS:

Required:

  • National Senior Certification or equivalent
  • No working experience required

Beneficial:

  • CompTIA S+
  • Network Certifications: Network+ and/or CCNA

TECHNICAL COMPETENCIES & SKILLS:

  • Actively participate in the process of learning how to navigate through the Office 365 Platform.
  • Basic understanding of network and email security principles
  • Basic Understanding of Computer Networks.
  • Actively participate in the process of learning how to deliver remote support.
  • Basic understanding of computer hardware components through training and guidance.
  • Basic understanding of Microsoft Word.
  • Basic understanding of Microsoft Excel.
  • Basic knowledge of Vulnerability Tools such as Qualys or Nessus.
  • Basic understanding of Ticketing tools such as Autotask or helpdesk software.
  • Basic understanding of RMM tools such as N-central.

BEHAVIOURAL COMPETENCIES:

  • Approachable
  • Detail-focused
  • Rigorous
  • Tenacious
  • Calm
  • Internal Control
  • Resilient
  • Stress Management
  • Self-development
  • Change
  • Ethics

Should you work from home, it is your responsibility to ensure that you have uninterrupted internet connectivity and a ‘work-like’ environment at your home location to deliver your best in terms of performance and productivity.

Apply now Apply later
Job stats:  2  1  0

Tags: Analytics Audits Automation Bash Blue team Business Intelligence Cloud CompTIA Data Analytics Incident response Monitoring Nessus PowerShell Qualys SOC Vulnerabilities

Perks/benefits: Career development Startup environment

Regions: Remote/Anywhere Africa
Country: South Africa

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.