IronNet Internships

ACTION MEMORANDUM FOR ALL AAS/SW AREA AND REGION COMMANDERS AND PRESIDENTS: FOR IMMEDIATE DISTRIBUTION TO ALL MEMBERS

SUBJECT: PAID INTERNSHIP; CYBER FOCUSED STUDENTS WITH IRONNET INC

FROM THE EXECUTIVE DIRECTORS

1.  IronNet Cybersecurity Inc. is accepting applications for as many as three to five internship positions in the Washington DC metro area.  THE SUSPENSE FOR APPLICATION SUBMISSION IS 1 FEBRUARY 2018; EARLIER APPLICATIONS ARE STRONGLY ENCOURAGED. 

2.  IronNet is exclusively continuing to offer these internships to AAS/SW students based on the performance of the AAS/SW Interns for the past two years.  Students interested in these internships will apply directly to IronNet (courtesy copy to mgmt.center@arnold-air.org).  A detailed position description and application instructions are included below.  

3.  These positions are for interns working within the IronNet Cyber Operations Center (CyOC) conducting computer network defense operations and implementing security controls on behalf of large organizations with expansive and complex network topologies.  Once integrated into operations, the position requires the ability to detect and analyze anomalies within company infrastructure, integrate engineered solutions, implement security controls and collaborate on IT requirements across multiple divisions within the company.  Applicant should have an understanding of general cybersecurity and incident response frameworks that are used both nationally and internationally.  Shift work may be required.  Travel required: 25%

4.  Duties:

  • Conduct data mining and research operations amongst a variety of tool sets in order to perform network security operations that deliver ideas about anomalous network activity and potential adversary Tactics, Techniques and Procedures (TTPs).

  • Analyze the memory of systems to look for Indicators of Compromise (IOCs) of running processes, handles, files, keywords, network communications, privileged user account misuse, and other items.

  • Conduct analytical assessments and use corresponding products to produce reports, or visualization tools to answer requests for information or daily operations center use.

  • Collaborate with other network analysts and threat intelligence analysts to achieve network security and incident response objectives.

  • Determine deviations in the network configuration and rapidly identify and develop countermeasures within security designs (enterprise architecture, firewalls, VPN, and security technologies, as examples).

  • Regularly assess network security controls and devise strategies for implementing the IronNet Network Security program throughout the enterprise.

  • Manage enterprise security technologies e.g., firewalls, endpoint solutions, etc.

  • Collaborate with an operationalized mitigations team by making recommendations for network hardening, mapping, configuration and other diagnostic considerations.

  • Identify and enhance network performance measures and availability.

5.  Focus of positions:

Initial responsibilities will revolve around using, testing, and making recommendations for the development of a world-class hunting platform as a subcomponent of a larger framework.  Operations and training responsibility will include developing monitoring, hunting and training workflows or solutions for commercial clients.  A longer-term opportunity will include responsibility for computer network defense operations within an operation center environment. 

6.  Qualities: 

  • Knowledge of Windows and otherOS internals and popular filesystems

  • Linux/UNIX system administration, along with network (router and switch), Web server, firewall,or DNS administration  

  • Demonstrate knowledge/experience with Host or Network IDS/IPS, NetFlow and protocol collection and analysis tools 

  • Knowledge of vulnerability assessment and penetration testing tools

  • Knowledge of entire TCP/IP or OSI network protocol stack, including major protocols such as IP, Internet Control Message Protocol (ICMP),  TCP, User Datagram Protocol (UDP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and SSH

  • Familiarity of malware analysis tools and frameworks

  1. 7.  Highly desirable qualifications:

  • CompTIA Security+

  • CompTIA Network+

  • Certified Ethical Hacker (CEH)

  • Military or formal vocational technical training in computer network 

  • Degree in computer science/engineering, Cybersecurity or related field 

  • Cisco Certified Network Administrator/Professional (CCNA/CCNP) 

  • Certified Information System Security Professional (CISSP) 

  • Certified Computer Examiner (CCE)

  • Computer Security Incident Handler (CSIH)

  • Linux Professional Institute Certification 1 (LPIC‐1)

  • Microsoft Certifications (MCSE, MCITP)

  • GIAC Certified Incident Handler (GCIH)

  • GIAC Certified Intrusion Analyst (GCIA)

  • GIAC Certified Forensic Analyst (GCFA)

  • GIAC Certified Penetration Tester (GPEN)

  • GIAC Reverse Engineering Malware (GREM)

8.  Highly desirable degree plans:

Computer Engineering

Cyber Security

Software Engineering

9.  Application Instructions:  Applicants should electronically submit resume and copy of complete transcripts to the listed POCs NLT 01 Feb 18 for a 15 Feb 18 selection.

Primary POC:   Christine Gordon, Christine.Gordon@ironnetcybersecurity.com

Alternate POC: Trisha Dixon, Trisha.Dixon@ironnetcybersecurity.com

Signed//DPW//28 Oct 2017