PROGRAM STAŻU

advertisement
PROGRAM STAŻU / INTERNSHIP PROGRAM
Nazwa podmiotu oferującego staż
IBM Global Services Delivery Centre Polska Sp. z o.o.
Miejsce odbywania stażu
Ul. Muchoborska 8, 54-424 Wrocław
Stanowisko, obszar działania
Junior Threat Analyst / SIEM Analyst
Number of places for students/ graduates: 8
Termin
1 lipiec 2015 - 31 sierpień 2015 / July 1st – August 31st 2015
1 sierpień 2015 – 30 wrzesień 2015 / Augist 1st – September 30th 2015
Obszary merytoryczne, z którymi student ma szanse zapoznać się podczas odbywania
stażu. Czego Student może się nauczyć. Jakie kompetencje może rozwijać.
Students will have the opportunity to:
1. Work with LotusNotes, Red Hat Linux Enterprise, QRadar SIEM, ArcSight ESM, BMC Remedy, IBM Maximo,
multiple collaboration tools.
2. Practice use of English language
3. Work in multicultural, international environment
4. Support complex Development of Security Operations Center (DoSOC) project.
5. Develop knowledge and experience in the new attractive areas such:
- Security Information and Events Management
- SIEM system usage and administration
- Security Incidents Response
- Threats and Voulnerabilities Analysis
Harmonogram z propozycją liczby godzin oraz zakresem zadań merytorycznych w ujęciu
tygodniowym.
Tydzień 1 / Week 1





IBM welcome session + online training
MSS Overview (processes, services)
MSS Tools (QRadar, Remedy, Unified Console, others)
Threat Analytics
Total hours: 40 (8/5)
Tydzień 2/ Week 2
Tydzień 3/ Week 3
Tydzień 4/ Week 4
Tydzień 5/ Week 5
Tydzień 6/ Week 6
Tydzień 7/ Week 7
Tydzień 8/ Week 8
Tydzień 9/ Week 9
Tydzień 10/ Week
10
Tydzień 11/ Week
11
 Shadowing with assigned buddy (experienced security threat analyst)
 Supporting IT operations activities
 Activities reporting in defined template – shift log
Hours in week: as per defined schedule (24/7), attendance on the same shift as buddy
 Shadowing with assigned buddy (experienced security threat analyst)
 Supporting IT operations activities
 Activities reporting in defined template – shift log
 Hours in week: as per defined schedule (24/7), attendance on the same shift as
buddy
 Shadowing with assigned buddy (experienced security threat analyst)
 Supporting IT operations activities
 Activities reporting in defined template – shift log
 Hours in week: as per defined schedule (24/7), attendance on the same shift as
buddy
 Shadowing with assigned buddy (experienced security threat analyst)
 Supporting IT operations activities
 Activities reporting in defined template – shift log
 Hours in week: as per defined schedule (24/7), attendance on the same shift as
buddy
 Shadowing with assigned buddy (experienced security threat analyst)
 Supporting IT operations activities
 Activities reporting in defined template – shift log
 Hours in week: as per defined schedule (24/7), attendance on the same shift as
buddy
 Analysis made by intern and verified by buddy
 Monitoring, research, and analysis of the security alerts, incidents, offenses
 Detect and investigate threats based on events in SIEM software
 Usage of inter-operational processes and procedures
 Response and adherence to customer‘s to security requirements
 Analyze and customize client solutions
 Analysis made by intern and verified by buddy
 Monitoring, research, and analysis of the security alerts, incidents, offenses
 Detect and investigate threats based on events in SIEM software
 Usage of inter-operational processes and procedures
 Response and adherence to customer‘s to security requirements
 Analyze and customize client solutions
 Analysis made by intern and verified by buddy
 Monitoring, research, and analysis of the security alerts, incidents, offenses
 Detect and investigate threats based on events in SIEM software
 Usage of inter-operational processes and procedures
 Response and adherence to customer‘s to security requirements
 Analyze and customize client solutions
 Analysis made by intern and verified by buddy
 Monitoring, research, and analysis of the security alerts, incidents, offenses
 Detect and investigate threats based on events in SIEM software
 Usage of inter-operational processes and procedures
 Response and adherence to customer‘s to security requirements
 Analyze and customize client solutions
 Analysis made by intern and verified by buddy
 Monitoring, research, and analysis of the security alerts, incidents, offenses
 Detect and investigate threats based on events in SIEM software
 Usage of inter-operational processes and procedures
 Response and adherence to customer‘s to security requirements
 Analyze and customize client solutions




Tydzień 12/ Week
12
Final asessment and internships summary preparation based on:
tickets quality
feedback from buddy, team members and TL, peers
Activities reported in defined template – shift log
Wymagania stawiane kandydatom
Rok studiów
Graduate or last year student (Bachelor, Engineer, Master)
Kierunek
studiów
IT, administration , management , economic (but not limited to).
Znajomość
języków obcych
English
Profil
kandydata
(oczekiwane
kompetencje)







Inne
Academic IT Network Knowledge required
Willingness to develop skills and build career in cyber security technology
Good communication skills and teamworking
Detail oriented
Ready to contact directly with MSS customers
English communicative
Graduate or last year student
The work is in mode 7x24 so candidate must be ready to shodow buddy during his/her shifts.
Related documents
Download