Category Archives: cyber forensics and information security

Internship for National Cyber-Forensics & Training Alliance (NCFTA)

The National Cyber-Forensics & Training Alliance (NCFTA) is a Pittsburgh based globally focused non-profit corporation committed to identifying, mitigating and neutralizing cyber crime threats. The NCFTA operates by conducting real time information sharing by analysis and subject matter experts in the public, private and academic sectors. Through these partnerships, the NCFTA proactively identifies cyber threats in order to help its partners take preventive measures to mitigate and neutralize those threats. For more information see http://www.ncfta.net.

The NCFTA offers talented students an innovative work experience in a growing sector that will help them enhance their professional development and academic goals. Our program offers paid internships for undergraduate and graduate degree students. It is an intensive 12-week program that gives rising college seniors or graduate level students the opportunity to work in areas such as intellectual property fraud, financial fraud, and malware and cyber threats in order to build knowledge and skills in the intelligence analysis field. The student will receive training and be part of the team from day one. They will be assigned to a manager and mentor to enable them to quickly learn and acclimate. During their first few weeks on the team, they will participate in the internship orientation to become familiar with the NCFTA’s various resources, policies and procedures.

Role of the Intern:

Selected candidates will work on various organizational program initiatives. Duties will focus on conducting research and data collection using various tools and applications as well as proactive research in open sources to produce a finished product for dissemination. The intern will engage in collaboration with NCFTA partners and peers and be expected to participate in program meetings.

Internships with our Malware & Cyber Threats Program are more technical in nature and, as such, applicants with a sound technical background are desired. These duties may include writing scripts to automate processes (e.g. Python & shell/bash scripts), reviewing and analyzing malicious code (e.g. C, C++, VB.NET, Assembly, Java), and creating databases (MySQL, MS SQLServer, Postgress). Students with working knowledge of Mac OSX may have an opportunity to work on special projects.

Required Qualifications:
• Must be legally authorized to work in the United States and be eligible for a U.S. Government security clearance
• Major studies in areas of consideration: International Affairs/Politics/Relations; Intelligence/Security Studies; Computer Science; Information Security; Business Intelligence or related fields. Other majors are considered on a case by case basis.
• Minimum GPA of 3.0
• Excellent writing skills and strong analytical thinking
• Proficiency in Microsoft Office required
• Arabic, Turkish, Russian, Chinese and Eastern European language skills desirable but not required
• Extensive experience with computers and networking highly preferred but not required

Candidate Skills:
While applicants come from a range of academic backgrounds, the most competitive applicants also should possess the following:
• Flexibility and adaptability
• Take initiative and be self-motivated
• Work well with others and have strong interpersonal abilities
• Good judgment and decision-making skills

Locations: Internships are available in Pittsburgh, PA

Application Instructions:

How to Apply: Resumes should be directed to: HumanResources@ncfta.net. Please include:
• Your resume
• A cover letter in which you specify your qualifications for the position and address why you want to intern as an analyst
• Unofficial transcript

Uber Presentation – Wednesday, September 27th

Matt Wood, a member of Uber’s security team, will be presenting on cyber security threats and vulnerabilities as they relate to autonomous cars. The presentation will take place on Wednesday, September 27th, from 4:00PM to 5:30PM in the Wheatley Atrium.

This is a Top Secret Colonials sponsored event. Refreshments will be provided. Students can earn one hour of SET credit for attending the event. A flyer for the event is posted below.

UBER

Dr. Karen Paullet presents NSF-funded research on Mobile Forensics & Security at the RMU Research & Grants Expo

paullet-nsf-grant-expoOn April 24, 2017, RMU held a Research & Grants Expo highlighting a variety of faculty research and grant projects.  All of the RMU campus was invited to attend this event.  Dr. Karen Paullet presented the Mobile Forensics and Security Project, an NSF-funded grant.  Dr. Paullet is the PI on the grant, along with Dr. Jamie Pinchot (Co-PI), Dr. Sushma Mishra (Co-PI), and Dr. Fred Kohun.  Mobile security and forensics is an underrepresented area of study that is increasingly important in our current society.  This research will advance knowledge in the field of mobile cybersecurity and mobile forensics through a train-the-trainer program for 50 faculty members from universities across the United States.  Twenty-five faculty were trained in July 2016 and the remaining half will be trained this year.  Dr. Paullet also highlighted a new online certificate offered by RMU in Mobile Forensics and Security (MFS).  This certificate is now available and you can learn more about it here: Mobile Forensics and Security Certificate Program.

Risk Assessment for TEKsystems

Top Three Skills:
1) Conduct Information Risk Assessments as assigned to the team. Request and analyze documentation necessary to perform appropriate assessment and conduct necessary interviews in order to collect and review relevant materials necessary to produce results of the assessment.
2) Clearly and concisely document and communicate risk assessment results with requestor, security architects and management, as appropriate. (Be able to be that liason between the business and technical people).
3) Conduct and formulate appropriate risk scoring, as it relates to threat, vulnerability, likelihood, impact, security controls/counter-measures, etc. (Rank risk/inherent risk score).

Looking for an individual to come in with an information security background to look at documentation, review findings, and write risk assessments. This person will act as the liason between technical people and the business as they analyze data and rank risk based on their findings. Preferred knowledge of the HITRUST framework is encouraged, not required.

Qualifications:
1) Ability to communicate with technical and non-technical people.
Apply to Brian Jendesky at bjendesk@TEKsystems.com

Cats Being Used in the IT Field

In this year’s Def Con convention this year showcase had a different twist on IT work. One that merged animals and IT working together. It sounds like a crazy combination and a highly unlikely one that would work well but it did. Gene Bransfield used his friend’s cat, he put on the cat’s color a kit that had Spark Core Wi-Fi development board and had Internet connectivity where ever the cat ended up going.

Now this may sound stupid because cats are going to wander around and do whatever they want to do. But the purpose of the experiment was to see how many people had unsecured, or weak Wi-Fi in their homes. In simple terms who could easily access their Internet just from being on their street.

When the cat was sent out, there was 23 Wi-Fi hotspots found and what they found was more interesting. Four of the networks had been completely open with no security what so ever and four using WEP rather than the WPA-2 standard. The purpose of this was to show that people need to be more aware of the fact that when it comes to Internet you have to have the right safety and protective measures when using the Internet. You never know when a cat or dog with a pack on them will be lurking around to see if you have secure Internet.

Practice Interviews for Computer-related majors with Federated Investors

Federated Investors will be on campus Monday, April 3 to conduct practice interviews specifically for Computer-related Undergraduate students. These majors include:

BS (Bachelor of Science) or BS in Information Sciences
Computer Information Systems
Cyber Forensics Info Security (Fully Online)
Cyber Forensics and Information Security
Data Analytics

Students should treat these mock interviews as real interviews, dressing professionally and researching the company. The practice interview times will be on a first-come, first-serve basis. They will be conducted in the Career and Professional Development Center (aka Career Center), which is located in Benjamin Rush, the building near the back entrance of campus.

To sign up for these interviews:

  1. Go to the ON-CAMPUS INTERVIEW tab on the top toolbar of ColonialTRAK and select ‘Sign up for Interviews or Resume Drops
  2. Select Schedule 770 / PRACTICE INTERVIEW – IS/IT/COMPUTER-related Undergraduate MAJORS ONLY- Federated Investors Company Name: Mock.
  3. Click on the ‘Sign Up‘ button centered near the top of the page.  The list of available interview times will appear.  Select the time desired for the practice interview.

Students should only sign up if they are committed to attend the practice interview. For more information, go to the ColonialTRAK website. If anyone has questions, please contact Carole Weldon at weldon@rmu.edu.

Internship Opportunity – Spanish fluency National Cyber-Forensics & Training Alliance (NCFTA)

The National Cyber-Forensics & Training Alliance (NCFTA) are looking for a candidate who is fluent in the Spanish language. As an intern, you will work with a senior analyst on specific research and data collection using various tools and applications as well as proactive research in open sources. You will also engage in collaboration with NCFTA partners and peers and be expected to participate in program meetings.

Required Qualifications 
• Must be legally authorized to work in the United States and be eligible for a U.S. Government security clearance
• Major studies in areas of consideration: International Affairs/Politics/Relations; Intelligence/Security Studies; Computer Science; Information Security; Business Intelligence or related fields. Other majors are considered on a case by case basis.
• SPANISH FLUENCY REQUIRED – Excellent Verbal and Writing Communication Skills in the Spanish Language
• Minimum GPA of 3.0

To apply for this internship, please click on the link below.

https://www.myinterfase.com/rmu/Job/Detail/b2wvYUd1dDNiaGRZbjlZcG1TWGt5ZjlaUjZGc2lHYWY3NVB4Y21OQWdQST01