CyberSOC Internship Challenge 2022 | 11th Edition
Thank you to everyone who applied!
Follow us on our social media channels for more information on upcoming editions and future opportunities
WHO WE ARE?
CyberSOC Africa is a leading provider of cyber security services. Everyday at CyberSOC, all kinds of people play vital roles in helping organizations, public and private, large, and small, protecting their cyber environment. These organizations expect the best from us and we at CyberSOC respond by recruiting truly outstanding people. Our graduate program offers opportunities for fresh graduates with little or no experience. Whoever you are, we’ll help you thrive, personally and professionally.
WHO CAN APPLY?
Must have a University Degree
Must be a Nigerian Resident or have the permit to work in Nigeria
Must be either waiting for NYSC, undergoing, completed NYSC or provide appropriate documentation of exemption
WHAT ARE WE OFFERING?
An enabling learning environment, comprehensive Cyber Security Training Curriculum, Practical/hands on training scenarios. An opportunity to be hired as a Cyber Security Analyst once you can scale through all the hurdles and tests, a rewarding Career growth plan into roles such as:
Cyber Security Analyst Tier 1
Tier 1 SOC analysts are trained specialists who monitor, manage, and configure security tools, review incidents to assess their urgency, and escalate incidents if necessary.
Cyber Security Analyst Tier 2
Incident Responder. All Tier1 skills +. Reviews trouble ticket generated byTier1 analysts and use threat Intelligence to identify infected/affected systems and scope of the attack.
Cyber Intelligence Analyst OSINT
Cyber intelligence analysts utilize threat intelligence to mitigate any potential data threats and defend data as well as compile reports that identify ways to pinpoint and prepare for potential threats.
Digital Forensics Investigator
A Computer Forensics Investigator or Forensic Analyst is a specially trained professional, to retrieve information from computers and other types of data storage devices.
Cyber Security Engineer
Cyber-security engineers, identify threats and vulnerabilities in systems and software, and apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, ransomware, insider threats and all types of cybercrime.
Cyber Incident Responder
This role investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Red Team Penetration tester
Red teaming is a much broader approach to penetration testing that uses the methods of real-life attackers to test if an attack is possible through an evaluation of the organization's security controls, threat intelligence, and incident response procedures.
Information not available yet