I.T. Data Entry PAID InternshipGIE Dental Lab
Website and digital-assistant Intern for growing nonprofit organization in NYC - FashionCouncil for Fashion and Social Change
Mobile App Developer - Work from Home, School or anywhere in the world!Connect With Training
Web Development InternFortress Consulting Group
SAP Internship ProgramSage Group Consulting Inc
Network Infrastructure EngineerAscent Innovations LLC
Records Management InternCapital Metro
NYC-Information Technology InternshipCinedigm
Infosec InternshipBookmark This
Posted: June 17 2016
Always be on the alert for potentially fraudulent job postings online - never send money to a potential employer.
DescriptionExcited about information security? want to become a pen tester / security engineer / cryptographer / auditor / forensics expert? Come to Peerlyst.com to find 5000+ mentors - the best security experts from the entire world. Sign up, tell us a bit about yourself and pick the tags of your interest. We will help you find a mentor. Peerlyst does not charge the intern or the mentor. This is a service that's free, intended to help new security professionals immerse in this industry and build their expertise.
ResponsibilitiesResearch specific assigned security topics and post about them, ask questions, answer questions, install products, write know hows, resources and other posts. Mentors would also assign specific tasks.
RequirementsCoursework or respective hands-on experience demonstrating some self-learning in the IT/security space, and ideally some previous related projects. The specifics obviously depend on the specific area of security that you're interested in. So for example, a pen tester would ideally need to demonstrate some sysadmin and programmer skills.
All candidates need to be fluent in english and with very high english communication skills, including the ability to write a post demonstrating their learnings.
SkillsRequired - Software Development, System Administration
Preferred - Security Awareness, Security Assessments, Security Audits, Security Incident Response, Information Security Management