Author Archives: thompsonbe

Unknown's avatar

About thompsonbe

I am a freshman commuter going to Robert Morris university for cyber forensics and information security.

SOC Analyst Job for Ideal Integrations Inc.

What would I be doing for this job?

If you are a CIS major who is a night owl but also very articulate, then we have a full-time job for you!  This job requires strong verbal skills for conversing with clients through written, verbal, phone, or in person means, as well as thorough documentation of situations.

This security job also includes:

  • analyzing, identifying, and eliminating customer security alerts, events, or incidents.
  •  identifying weaknesses in customer infrastructures – suggest solutions/improvements
  • assisting in creation and maintenance of documentation for SOC procedure and processes
  • Ensuring that they are complying with Information Security Policies
  • Ensuring that all security and operational controls are followed and enforced.

Requirements:

  • personal vehicle/valid license
  • 24/7 on-call work
  • Ability to work in fast paced environment
  • Travel
  • Heavy lifting
  • staying up to date on latest vulnerabilities, exploits, and any other relevant threat information
  • [preferred]:
    • Technical or Associate degree in relevant field   -OR-
    • 1 year’s equivalent experience
  • Shift from 8pm – 7am.

Experience and Necessary skills:

  • SOC/NOC/Blue team
  • Programming/Shell scripting [examples:]
    • PERL
    • Python
    • Java
    • Shell
    • PowerShell
  • System or Network Administration
  • Configuration/implementation of Technical security solutions [examples:]
    • Firewalls
    • IDS/IPS
    • Antivirus
    • SIEM
  • Windows & Linux OS and applications
  • Security standards PTES, Defense in Depth, etc.

How to Apply:

To apply for this job, contact Chris Shillingburg at cshillingburg@idealintegrations.net.

IT/PC Technical Support Internship Dollar Bank

Interested in a year round internship?

This is it! This internship is perfect for real life work experience as a PC Support Technician.  If that’s intimidating, know that you will be working alongside experience IT professionals who will be able to aid you.  The job description even states that you will be working in a “supportive, team-oriented environment,” so that will be very helpful in getting you the professional training and mentoring that can get you real-job-ready!

Why Apply?

  • Part-time employees – that would be you – qualify for 401(k) with immediate vesting, pension, tuition reimbursement, and gym reimbursement.
  • Its not far away: Liberty Commons Building
    • 2700 Liberty Avenue, Pittsburgh PA

Job includes:

  • Utilizing windows deployment for workstations
  • Installing the required software, 
  • Performing routine hardware and software upgrades
  • Installing workstations in the back offices and branches, racking servers,
  • Moving computer equipment
  • First-level troubleshooting
  • Monday-Fridays; 20-25 hrs/week.

Qualifications:

  • 1 year of college
    • classes in Windows OS, PC repair, and networking
  • Working knowledge of Ethernet, TCP/IP, and Active Directory
  • Strong commitment to customer service
  • Occasional overtime
  • Good organizational skills
  • Ability to multitask effectively
  • Ability to lift 25 pounds – hardware is HEAVY
  • Ability to deal effectively with end-users, peers, managers in written as well as oral communications
  • Willing to accept duties as they are assigned to you

Application:

  • Apply quick, but no pressure; this internship does not expire until 12/18/17
  • For application, click here.

Linux Foundation Open Mainframe Project Summer Intern Program

“The Mission of the Open Mainframe Project is to create an open source, technical community that industry and community participants may easily participate in so that they may contribute to the creation of assets and materials that will benefit the development of Enterprise Grade characteristics of Linux.”

– Linux Foundation on the Open Mainframe Project

This is a rare opportunity – only 8 interns get this chance!  If selected, you would get to work with a mentor on your own custom project focusing on improvement of the High Availability, Disaster Recovery, Security, Reliability, Serviceability, Performance and/or Scalability of Linux.

Proposals should Include:

  • The project idea you would like to propose
  • Why you’d want to do this project
  • Your contact information
  • Your academic information/transcript/experience
  • 1 to 2 references

**Speak to Open Mainframe Project Mentors to get advice on applying.

Go to this link to apply.  Proposals are due February 15th, 2017.

 

 

Dollar Bank Internship

Job Description

  • Year round
  • Cloning workstations,
  • Installing workstations in the back office and branches,
  • Racking servers,
  • Moving computer equipment,
  • Performing routine hardware and software upgrades,
  • And first level troubleshooting.

Technical Qualifications

  • 1 year of college
  • Classes in Windows OS, PC repair, and networking
  • Working knowledge of Ethernet & TCP/IP
  • Customer Service committed
  • Available to sometimes work after hours+/weekend (Occasional overtime may be necessary)

Other Qualifications

  • Good Organizational skills
  • Multitasking skills
  • Ability to lift 25 pounds
  • Ability to deal effectively with end-users, peers, and managers (professional written and oral communications skills)
  • Willing to accept duties given

Would you like to apply?  Click here for application

**This opportunity expires February 26th, 2017. 

Spring Career Fair April 5th

Why should you go?

This career fair offers a key networking opportunity with potential employers from over 93 different organizations.  Many of these organizations will be looking for interns and/or full-time hires for current openings and/or summer work.

When is this?  

The career fair will be Tuesday April 5th, from 12:00 PM to 4:00 PM.

Where?

The career fair will be held in the Sewall Center Arena.

Organizations that will be there:

1-800-GOT-JUNK?
Aflac
Allegheny Health Network
Auto-Owners Insurance Company
AXA Advisors
Barber National Institute
BKD LLP: CPAs & Advisors
BNY Mellon
Boy Scouts of America, Laurel Highlands Council
Carlow University
Carnegie Science Center
ChildCare Careers
Clean Water Action
Clearview Federal Credit Union
Coca-Cola Refreshments
Coen Markets
Comcast Spotlight
ComDoc, a Xerox company
Commonwealth of PA, Pennsylvania State Police
Corazon Inc.
Country Meadows of South Hills
creehan & company
Custom Valve Repair
CVS Caremark
Cystic Fibrosis Foundation
DiNuzzo Index Advisors, Inc.
Dollar Bank
Eat’n Park Hospitality Group
Enterprise Rent-A-Car
Erie Insurance
Ethos Group
Expedient Data Centers
Fairfield Inn and Suites by Marriott
Farmers Insurance Group
Fastenal Company
FedEx Ground
FedEx Services
First Commonwealth Bank
Foresters Financial Services, Inc.
Glade Run Lutheran Services
Highmark Health
Holy Family Institute
Insight Global
InVision Human Services
Keller Williams Real Estate Professionals
Konecranes
LANtek Computer Services
Learning Ventures Inc., DBA College Nannies & Tutors of
North Pittsburgh
Levin Furniture
Lutheran SeniorLife
M&T Bank
Mainstay Life Services
MassMutual Pittsburgh
Maxim Healthcare Services
MetLife
Mitsubishi Electric Power Products, Inc.
Northwestern Mutual
Novitas Solutions
Office of the Comptroller of the Currency
Oxford Solutions Inc.
Paradies Lagardere
Partners for Quality, Inc.
Peak Technical Staffing USA
Pittsburgh Mercy
PLS Logistics Services
PPG Industries, Inc.
Precision HR, Inc
Prudential Advisors
Questeq
Rivers Casino
Robert Morris University
rue21
SagePoint Financial
ServiceLink
Southwestern Human Services
Specialty Consultants Inc.
Step By Step, Inc.
Summa Technologies, Inc.
Tender Care Learning Centers
The Bradley Center
The Washington Health System
The Woodlands Foundation
Travelers
U.S. Army
United States Air Force
United States Marine Corps Officer Program
UPS
Verland
W.K. Merriman, Inc.
Wagner Agency, Inc.
Waldron Private Wealth
Weirton Medical Center
WoodmenLife Financial Services
xceltech

***Do not miss the opportunity to connect face-to-face with our region’s top employers!***

Apple vs. FBI: The Debate between Privacy and Security

What is the fuss about? The reason that the FBI and Apple are in a heated debate is over one iPhone, but it is much more than that.  The argument began after a shooting in San Bernardino, California on December 2, 2015.  Considered as the worst mass shooting in modern US history since 2012, says NBC, the shooting ended with 14 killed and 21 wounded.    The 2 suspects for the shooting were both killed in a gun fight with policemen.  Terrorism is suspected (Ortiz, 2015).  With the FBI’s hands on the iPhone of one of the suspects, the FBI is desperately trying to gain access to the information on it to see if there was another shooter; law enforcement had previously believed that there may have been 3 shooters rather than just 2 (Ortiz, 2015).

In order to collect this information, the FBI needs access to the iPhone.  However, they are are struggling to gain access.  The FBI had contacted Apple and asked that they help them get information off of the device.  When asked, Apple denied helping, claiming that the FBI wants them to create a backdoor to get into all iPhone products.  The issue here is that iPhones are encrypted.

Why is this topic so controversial? This topic is so controversial because it goes so much further beyond just one simple iPhone; this situation magnifies the debate of security versus privacy.  This is something that the US government has been in turmoil over for years, especially when terrorism is involved.

The FBI is more concerned with security over privacy, while Apple is more concerned with privacy over security.  The FBI wants access to an iPhone that they have been locked out of when they reset the iPhone’s password when attempting to get into it.  Unfortunately, Apple says that since the password has been reset, there is no longer a connection to the cloud information because there is a password disconnect (Burchette, 2016). This is why the FBI has asked for a program to hack into the encrypted iPhone.  This is also why Apple is non-compliant .

Apple has exposed this situation because this shows a government that is no longer concerned with privacy, or with the consequences of creating such a program.  The difficulty of the matter is that this all comes back around to the Patriot Act, an amendment to the United States’ Electronic Communication Privacy Act (ECPA).  The Patriot Act has been around to create a loop hole for the Wiretap Act in order for law enforcement to surpass the need for a warrant for wiretapping, if there is suspected terrorism (Craig, 2013).  Given the controversy of this Act, there is clarity as to why this iPhone dilemma has gotten so big.

Can you see both sides?  Of course.  This entire thing has two different ways of looking at one case:

  • FBI’s Point of View:  There is a need to put the security of the United States over the general privacy of the people.  There is a need to look at the risk of not knowing crucial information on terrorism.  If you do not know what is going on, there is no way that another attack can be prevented.
  • Apple’s Point of View:  There is a need to put privacy before everything else.  If a program is made to get into the encrypted iPhone, it can be used by anyone who has it, and that is why there is so much resistance to make it.  This would not be one case, this would be the start of a further loss of privacy.

What is happening as of right now?  People have begun picking sides, and sticking to them.  Apple has written up its legal response detailing their refusal to the FBI’s request(s) (Heisler, 2016).  The FBI has continued to defend itself, claiming that it is not asking for a backdoor into all iPhones, but means to get into this one in particular.

All in all… This is a highly controversial topic and it is going to be one of many cases that will further influence the Crypto Wars, the battle between privacy-minded technologists and the U.S. government (McLaughlin & Froomkin, 2016).

__

Sources:

Burchette, J. (2016, February 21). FBI Admits It Reset San Bernardino Shooter’s iPhone Password. Retrieved from The Wrap: http://www.thewrap.com/fbi-admits-it-reset-san-bernardino-shooters-iphone-password/

Craig. (2013). Cyber Law: The Law of the Internet and Information Technology First Edition (pp. 92-131). Pearson.

Heisler, Y. (2016, February 25). Here’s Apple’s long-awaited legal response to the FBI. Retrieved from BGR: http://bgr.com/2016/02/25/apple-vs-fbi-legal-filing/

McLaughlin, J., & Froomkin, D. (2016, February 26). FBI vs Apple Establishes a New Phase of the Crypto Wars. Retrieved from The Intercept: https://theintercept.com/2016/02/26/fbi-vs-apple-post-crypto-wars/

Ortiz, E. (2015, December 3). San Bernardino Shooting: Timeline of How the Rampage Unfolded. Retrieved from NBC News: http://www.nbcnews.com/storyline/san-bernardino-shooting/san-bernardino-shooting-timeline-how-rampage-unfolded-n473501

 

 

 

 

 

Bender Computing- Positions for IT Majors with Disabilities

 

Bender Consulting Services Inc. has been a leading national expert in getting jobs for people with disabilities.  They have been supporting corporate and federal recruitment, workplace mentoring, and technology accessibility initiatives for 20 years now.

**For more general information, visit www.benderconsult.com.

Through the IT Leadership Rotational Program (being offered in Cranberry, PA; Blue Bell, PA; Downers Grove IL; and Phoenix, AZ), you would be able to get experiences key for your future career. You will:

  • Participate in extensive training and development opportunities
  • Develop key competencies through enterprise-wide rotational work experience and extensive training opportunities
  • Rotate through a series of challenging projects and technical assignments within IT organizations
  • Complete projects and assignments in areas such as cyber information security and architecture, project and program
    management, IT architecture, infrastructure, networking, engineering, and software testing, all designed to deliver real business
    results

In order to get a position, you will need to fill some qualifications:

  • Required – Pursuing a Bachelor’s degree in an information technology-related major, such as MIS or computer science, with an anticipated
    graduation date of May 2016.
  • Strongly preferred – GPA of 3.3 or higher .
  • Strongly preferred – Previous co-op or intern experience in related discipline.
  • Strongly preferred/Required – Drive for success in a fast-paced environment and determination to meet tight deadlines.
  • Required – Strong communication, analytical, results-oriented, interpersonal, and problem-solving skills.

To apply for this opportunity, visit www.benderconsult.com/careers/submit-resume to fill out the electronic form.

 

 

FREE Women Learn Coding Event in November

Interested in coding, but do not know where to start?  You are in luck ladies!

What is this?  This is an event perfect for all the women out there who want to learn how to code.  It is a free weekend workshop for women of all skill ranges – from never coded to professionals.  This event allows you to learn Ruby on Rails.

“Rails is the most well thought-out web development framework I’ve ever used.  And that’s in a decade of doing web applications for a living.  I’ve built my own frameworks, helped develop the Servlet API, and have created more than a few web servers from scratch.  Nobody has done it like this before.” – James Duncan Davidson, Creator of Tomcat and Ant

When/where is this?  November, in Pittsburgh’s very own Carnegie Museum of Art and Natural History.  4400 Forbes Ave Pittsburgh, PA 15213

InstallFest starts on Friday November 13th, 2015, from 7 – 9:30 PM, the Workshop starts on Saturday November 14th, 2015, from 8:30 – 5 PM, and Sunday November 15th, 2015, even has an after-party for those who attend the event.

Why do this? Why not??  It is free.  It is also an experience that may change your life forever.

“A lot of graduates love it so much that they decided to learn how to code, and even came back as teachers and TAs” – Professor John C. Turchek

How to sign up?  Go online to https://www.bridgetroll.org/events/223 to register.  **Only 22 students can attend this event so sign up fast!