Cyber Security Internship
Job Description:
Cyber Aegis Internship Main Responsibilities
● Analysis of cybersecurity capacity accordant to cybersecurity and agnate industry
threats.
● Abutment the Aegis aggregation in operational activities which may be accompanied by concrete security
and cyber security.
● Assist the Cybersecurity Operations aggregation to assay and clue vulnerabilities identified
● Assist the Cybersecurity Operations aggregation to acknowledge cybersecurity events
● Abutment in Assorted projects: cybersecurity, argumentative analysis, audits, accident assessments
and assimilation tests, etc.
● Assist in Developing scripts to advise assay logs
● Assist in cybersecurity applications/tools, Creating runbooks, playbooks, security
guidelines, and procedures, Gathering affidavits and metrics for altered areas of the
security stack
Cyber security Internship Required Domain Expertise:
● Cyber Security Internship Accept the baseline framework/standards and guidelines of cyber security, Information
technology such as ISO, NIST, MITR, COBIT, CMMi, etc.
● Should accept the absorbed to get into any new affair and analysis and present authenticated
facts and information.
● Addresses strategies for selecting a topic, allotment aboveboard sources for research, and
producing an able presentation.
● The alone should accept assorted technology agreements such as but not bound to Open
Systems Interconnection (OSI) model, TCP IP, Surface internet, deep/dark web.
Duration of Internship: 6 Months Only
Educational Qualification:
B.Tech / Mtech in Computer Science Engineering, BCA, MCA.
This job Cyber Security Internship requires an acquaintance of abeyant acquiescence risks and a charge to act with integrity, as the foundation for the Company’s success, reputation, and acceptable growth.
Company:
Airbus India Private Limited
Employment Type:
Internship
Experience Level:
Entry Level
Job Family:
By appointment your CV or appliance you according to Airbus appliance and autumn advice about you for ecology purposes apropos to your appliance or approaching employment. This advice will alone be acclimated by Airbus.
Airbus is committed to accomplishing workforce assortment and creating an across-the-board environment. We accept all applications irrespective of amusing and cultural background, age, gender, disability, animal orientation, or religious belief.
Airbus is, and consistently has been, committed to according opportunities for all. As such, we will never ask for any budgetary barter in the anatomy of an application process. Any clothing from Airbus to do so should appear to emsom@airbus.com.
At Airbus, we abutment you to work, connect, and coact calmly and flexibly. Wherever possible, we advance adjustable life arrangements to activate avant-garde thinking.
Technical Questions:
Cybersecurity Frameworks and Standards:
Can you explain the key apparatus of the ISO 27001 standard?
How does the NIST Cybersecurity Framework advise organizations to administer and abate cybersecurity risk?
What is the aberration amid COBIT and CMMI in the agreement of IT babysitting and management?
Networking and Aegis Concepts:
Can you explain the OSI archetypal and its acceptance in arrangement communication?
What is the aberration amid TCP and UDP?
How do you differentiate between the apparent web, abysmal web, and aphotic web?
Cybersecurity Operations:
How would you access anecdotic and tracking vulnerabilities in a system?
What accomplish would you booty to acknowledge at a cybersecurity event?
Can you explain what an assimilation essay is and why it is important?
Tools and Scripting:
What scripting languages are you accomplished in, and how have you acclimated them to assay logs?
Can you accord an archetype of calligraphy you wrote to automate a cybersecurity task?
How would you go about developing a runbook or playbook for adventure response?
Situational Questions:
Incident Response:
Describe a bearings area you had to acknowledge to an Aegis incident. What accomplish did you take, and what was the outcome?
If you apparent an analytical vulnerability in a system, how would you accent your acknowledgment and who would you acquaint with first?
Research and Presentation:
How would you worst an affair for assay in cybersecurity, and what sources would you accede credibly?
Can you call a time back when you had to present abstruse advice to a non-technical audience? How did you ensure they accepted the key points?
Project Involvement:
Describe an activity you were circuitous in that accompanied cybersecurity, argumentative analysis, or accident assessment. What was your role and what were the results?
How do you administer assorted projects with aggressive deadlines?
Behavioral Questions:
Team Collaboration:
Can you accommodate an archetype of a time back you formed in aggregation to break a circuitous problem? What was your role and how did the aggregation succeed?
How do you handle conflicts aural a team, abnormally back when it comes to cybersecurity decisions?
Learning and Adaptability:
Describe a time back when you had to learn a new technology or abstraction bound to complete a task. How did you access the acquirement process?
How do you adapt to the latest trends and developments in cybersecurity?
Integrity and Compliance:
Can you altercate a bearing area where you faced an ethical bind in your assignment or studies? How did you bold it?
Why do you anticipate acquiescence and candor are important in cybersecurity?