ANSYS, Inc. is looking for students to participate in their Spring and Summer 2018 Software Development Co-ops. ANSYS is located in Canonsburg and is the global leader in engineering simulation software that helps bring ideas to life. Co-ops rotate between school and full-time work assignments each semester. They develop and test our industry-leading simulation software while gaining real experience in their field of study.
The Spring 2018 Co-op is a 40-hour per week paid position starting January 2018 and concluding April 2018.
The Summer 2018 Co-op is a 40-hour per week paid position starting May 2018 and concluding August 2018.
• Work with software developers to design, implement, and debug
• Engineering simulation features
• UI toolkit components
• Infrastructure process and tools
• Online help systems
• Commitment to three (3) semester rotations for Engineers and two (2) semesters for Computer Science in partnership with University’s Co-op Office
• Pursuing a BS in Computer Science or Computer Engineering with a GPA of 3.0 or higher
• Must be currently enrolled in a full-time degree program and returning to the program after the completion of the co-op
• Exposure to C++, C#, Java or Python
• Sharp and tenacious problem solving skills
• Team player, responsible, and motivated
• Exposure to object oriented programming
• Strong math skills
• Web development experience
For the Spring 2018 Co-op, students can apply here or through ColonialTRAK. Applications must be submitted by Wednesday, November 15.
For the Summer 2018 Co-op, students can apply here or through ColonialTRAK. Applications must be submitted by March 1, 2018.
Apogee IT Services is looking for a part-time Senior Shop Technician for their location in Sewickley. They are looking for a team player who is passionate about technology, has strong interpersonal and organizational skills, and has excellent attention to detail. The salary is 10$/hour, with 20-35 hours per week.
The Senior Shop Technician will be responsible and accountable for maintaining the imaging infrastructure, quality checking all configurations, configurations of high level devices, escalation resolution, dispatching tickets, analysis and resolution; effective customer communication; and documentation in the ticketing system according to Apogee standards.
If you are looking for more information about this opportunity, click here to view the job on ColonialTrak.
To apply, email your resume to: email@example.com
This event was held October 26th, and in case you missed it, here are some of the highlights to be taken away from the presentation. So, if you were in class and regretted now skipping class for this, we have got you covered!
- Searches – he discussed how when you use the search bar, it is important to understand its format:
- [general code] | [less general] | [continually more specific search]
- as you can tell, the idea is that there are commands that you use that are processed from left to write, and each command is separate by the |(pipe).
- Save searches! – with there being so many different ways to slice all of the network traffic that Splunk is managing, having different frequented searches saved is very convenient to insure more time searching network traffic, and not google for Splunk commands.
- Statistics – in order for anomaly detection to work, there needs to be an idea of what is normal. One person’s smile could be another person’s bad-day face. It is important to judge off of what is normal for the network traffic, much like judging someone’s behavior off of what is normal for that person. The statistics generated are what determines what falls within normal behavior for their network.
- Real-time Graphs & Charts – generating graphs and charts that will actually change and adjust in real time are super important. It allows an easy way to understand what is going on in the network – instantaneously. Wolfe stressed that bosses will love something so clean, visually appealing, and content-specific.
This presentation was about Splunk, the security event manager/log aggregation software. If you have had Paullet’s class and suffered through the wonderfully challenging Enron emails assignment, then you have had a small taste of this software’s capabilities. Splunk can be used for a wide variety of applications because of its ability to organize/index large sums of information with ease into databases, or indexes. James Wolfe focused on Splunk’s network security applications. James Wolfe is a security administrator for U.S. Steel, so his job requires him to focus on network traffic such as IPs, users, or anything that could potentially indicate a point of failure for their network. Wolfe explained that the beauty of Splunk is that you can start looking without needing to know exactly what it is that you are looking for – exactly how I described my use of Splunk when trying to find incriminating Enron emails. Because security is the importance of the job, he discussed the commands that would be useful for security. These things included:
- dedup – removes duplicates in your search.
- 4625 – this code indicates a failure to log in
A very basic example shown to us to show how the data was being used to detect anomalies was through the ratio or successful to unsuccessful log ins for users. By creating a baseline formula for the rate of successful logins for each user, the computer can flag any time there is a change in this rate that goes within 1-2 standard deviations. The data is all producing algorithms and equations based on what you – the user of the Splunk software – deems important.
- table_raw – views the raw informaiton that splunk pulled the information from for the databases/indexes
This raw information was very education in seeing how convenient the software is, because the raw version was pretty jumbled, messy, and difficult to understand.
- Deskside/IT support is a good career start – you learn to troubleshoot
- Ask as many questions as you can – be willing to do projects; this will make you valuable.
- CERTIFICATIONS: N+* – basic fundamentals of networking.
- Government – certifications are legally required
- CCNA – CISCO; mid-level
- Maintain a strong work ethic
- Log into a firewall – download free for home*
- 2 year schools like ITT tech allows hands on experience
- 4 year degree preferable, but less hands on – it proves that you are hardworking and willing to put in the time necessary; this ties in greatly with having a strong work ethic.
- Microsoft imagine account; dream spark; 2016 data center OS worth $3,000 [we get it for free at RMU, so utilize it!]
- All acronyms – know.
- Splunk: just saying that you have worked with Splunk automatically gives you an edge against the competition for any job in security.
- Google: useful; know that it really is alright to google what you do not understand when doing anything on the computer. There is so much to know, and as long as you accept that you will be learning throughout your entire career, you will be able to stay in demand with employers.
- Companies have filters on their employee’s computers preventing them from going on certain sites. Because you cannot access these through google, users will use Bing as their loophole to sites that they are not supposed to access.
- U.S. Steel, much like other companies, uses firewall redundancy to prevent any debilitating security errors.
- Splunk is free to download; free for developers license. All software is free all you need is to buy your own server with 16 gigs – plenty for an at home – of ram. Buy second NIC. Spin up VMs. Download licenses.
Robert Morris University made College Choice’s rankings of the Best Online Bachelor’s and Online Master’s in Information Systems Security.
RMU’s Bachelor of Science in Cyber Forensics and Information Security ranked in the top 15 Best Information Systems Security Bachelor’s Online. The BS in Cyber Forensics and Information Security combines the disciplines of technology, business, organizational behavior, and law.
RMU’s Master of Science in Cyber Security and Information Assurance degree program prepares information systems and technology professionals to recognize and combat information systems threats and vulnerabilities. The MS in Cyber Security and Information Asssurance ranked in the top 30 Best I.T. Systems Security Master’s Online.
CollegeChoice also noted, “Even though Robert Morris University’s enrollment is just around 5,000 students, its online capabilities have made a big impression in the world of rankings. In US News & World Report’s ‘Best Online Universities of 2017,’ RMU ranked in the top 10 percent in the nation. Within the state of Pennsylvania, Educemic named it the 3rd Top Pennsylvania Online School.”