CyberSOC Internship Challenge 2022 | 11th Edition
Thank you to everyone who applied!
Follow us on our social media channels for more information on upcoming editions and future opportunities
WHO WE ARE?
CyberSOC Africa is a leading provider of cyber security services. At CyberSOC we appreciate new ideas and perspectives, coming from individuals with experience which we find valuable to us to join our existing team of competent staff. As long as you have 1-3 years of Information Technology background that translates to our core business, we would be glad to have you join our training program..
You will find your experience both rewarding and challenging, so if you’re looking for a place to develop your career, this is a journey you’ll want to be a part of.
WHO CAN APPLY?
Eligibility Criteria:
-
Minimum of 1 year relevant experience in the Information Technology (IT) industry
-
Must be either a Nigerian/Kenyan/Zambian/Benin Republic/Angola Resident
COURSE PATH
You will be trained on cyber-security fundamental topics, cyber-security operation center technologies and methodology, cyber-security incident response technology and methodology, cyber threat intelligence methodology and security.
WHAT ARE WE OFFERING?
An enabling learning environment, comprehensive Cyber Security Training Curriculum, Practical/hands on training scenarios. An opportunity to be hired as a Cyber Security Professional once you can scale through all the hurdles and tests, a rewarding Career growth plan into roles such as:
-
Cyber Security Analyst Tier 1
Tier 1 SOC analysts are trained specialists who monitor, manage, and configure security tools, review incidents to assess their urgency, and escalate incidents if necessary.
-
Cyber Security Analyst Tier 2
Incident Responder. All Tier1 skills +. Reviews trouble ticket generated byTier1 analysts and use threat Intelligence to identify infected/affected systems and scope of the attack.
-
Cyber Intelligence Analyst OSINT
Cyber intelligence analysts utilize threat intelligence to mitigate any potential data threats and defend data as well as compile reports that identify ways to pinpoint and prepare for potential threats.
-
Digital Forensics Investigator
A Computer Forensics Investigator or Forensic Analyst is a specially trained professional, to retrieve information from computers and other types of data storage devices.
-
Cyber Security Engineer
Cyber-security engineers, identify threats and vulnerabilities in systems and software, and apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, ransomware, insider threats and all types of cybercrime.
-
Cyber Incident Responder
This role investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
-
Red Team Penetration tester
Red teaming is a much broader approach to penetration testing that uses the methods of real-life attackers to test if an attackis possible through an evaluation of the organization's security controls, threat intelligence, and incident response procedures.