Description
Position Summary: Mary Greeley Medical Center#s Information Systems department is seeking an IS Security Intern for the summer 2025 semester#to support cybersecurity initiatives at the hospital. The Information Security Intern will#work alongside our Information Security and Threat Management Analysts to detect malicious activity and threats within the hospital#s device, network, and identity systems. This work will drive changes in our security alerting, architecture, and detection capabilities. The ability to script or automate these workflows is highly encouraged. Included in this work will be creating custom detection rules, identifying opportunities to tune existing security tools, and analyzing network traffic. The intern will also work to reduce our attack surface by identifying and remediating threats found using vulnerability management tools. This threat management work will involve using existing tools to scan systems and devices for known threats and working with system owners to ensure they are remediated. The Information Security Intern will also perform auditing and testing to ensure that existing security controls are functioning and the use of offensive security tools to identify potential security gaps. Position Responsibilities: Follow all HIPPA regulations and hospital policies, while also acting with integrity and discretion in your daily work. Assist with updating and identifying items for our risk register. Identity and assist with automating security processes or detection responses. Help building formalized response playbooks and dashboards. Assist with long-term vulnerability management projects by gathering data from log and systems. Testing of existing security controls using approved offensive security tools and vulnerability detection tools. Assist with employee education on Information Security threats and best practices. Identify opportunities to mitigate against known threats or identify opportunities to harden systems based on the MITRE ATT#CK Framework. Review threat intelligence bulletins to identify the impact to our organization and ingest them into the security tools. Basic use of query languages to search logs and to craft custom detection rules. Validation of patching and configuration management across a fleet of network, desktop, laptop, and virtual hosts. Review and optimization of logging, alerting, and detection capabilities. Investigate alerts and communicate with key stakeholders to respond and mitigate any identified threats. # Qualifications, Knowledge # Experience: 3.0 Cumulative GPA. 12 completed semester hours at college or university. Working towards a degree in an IT related field. # Preferred Qualifications: Previous internship and/or work experience. Experience working in Microsoft Azure, Intune, Defender, or Sentinel. Participation in capture the flag games, cyber defense competitions, or significant time completing cybersecurity labs like Hackthebox or TryHackMe. Experience using SIEM, IDS, EDR/XDR, and SOAR tools. Experience creating automation scripts or automation tools like Power Automate. # Required Knowledge, Skills # Experience: Knowledge of Microsoft server and Active Directory technologies. Ability to think critically and find solutions for technology-based problems. Ability to work and plan independently. Strong working knowledge and understanding of MS Office Products. Demonstrated ability to problem solve and work as part of a team (this could be through involvement in work experience, clubs, community work, etc.). Demonstrated work and interest in cybersecurity skills and topics Strong time management skills. Knowledge of Internet browsers, especially Internet Explorer. Excellent customer service skills. Basic understanding of query languages (SQL, KQL, or Lucene) and scripting languages (PowerShell, Bash, Python, etc.) Basic understanding of modern operating systems, virtualization, and cloud computing. Basic understanding of common network protocols and core networking concepts. #
Apply on company website