Get a great career head start with CyberSOC | CyberSOC

CyberSOC

CyberSOC Internship Challenge 2022 | 11th Edition

APPLICATIONS CLOSED

Thank you to everyone who applied!
Follow us on our social media channels for more information on upcoming editions and future opportunities

WHO WE ARE?

CyberSOC Africa is a leading provider of cyber security services. The objective of the CyberSOC Undergraduate training program is to provide challenging opportunities for talented undergraduate students to gain technical and practical knowledge into the cybersecurity environment.

The program is designed to provide an enriching experience characterized by measurable on-the-job training, designed to help you succeed in the company. It is an avenue to develop cyber security skills in young individuals and assist them in realizing their potentials.

We aspire to build a long-term relationship between CyberSOC and the interns for potential full-time employment in the future. You can still be a student and work & earn part-time.

WHO CAN APPLY?

Eligibility criteria:

  • Must have O level certificate

  • Must have not graduated from the University

  • Must be willing to work On Premise in Lagos HQ part time

WHAT ARE WE OFFERING?

An enabling learning environment, comprehensive Cyber Security Training Curriculum, Practical/hands on training scenarios. An opportunity to be hired as a Cyber Security Professional once you can scale through all the hurdles and tests, a rewarding Career growth plan into roles such as:

  1. CyberSecurity Analyst Tier 1

    Tier 1 SOC analysts are trained specialists who monitor, manage, and configure security tools, review incidents to assess their urgency, and escalate incidents if necessary.

  2. Cyber Security Analyst Tier 2

    Incident Responder. All Tier1 skills +. Reviews trouble ticket generated byTier1analysts and use threat Intelligence to identify infected/affected systems and scope of the attack.

  3. Cyber Intelligence Analyst OSINT

    Cyber intelligence analysts utilize threat intelligence to mitigate any potential data threats and defend data as well as compile reports that identify ways to pinpoint and prepare for potential threats.

  4. Digital Forensics investigator

    A Computer Forensics Investigator or Forensic Analyst is a specially trained professional, to retrieve information from computers and other types of data storage devices.

  5. Cyber Security Engineer

    Cybersecurity engineers, identify threats and vulnerabilities in systems and software, and apply their skills to developing and implementing high-tech solutions to defend against hacking, malware, ransomware, insider threats and all types of cybercrime.

  6. Cyber Incident Responder

    This role investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

  7. Red Team Penetration tester

    Redteaming is a much broader approach to penetration testing that uses the methods of real-life attackers to test if an attack is possible through an evaluation of the organization's security controls, threat intelligence, and incident response procedures.

COURSE DURATION

Information not yet available.

Protect Me

Experiencing a security incident

Contact Us
Whatsapp icon Contact Us