Category Archives: events

DHS Cybersecurity Jobs and Internships Webinar

The U.S. Department of Homeland Security (DHS) will be hosting the National Protection and Programs Directorate (NPPD) Cybersecurity Webinar. The event will take place from 4:00 p.m. – 5:00 p.m. on Thursday, March 29.

The webinar will be for college and university students and recent graduates interested in pursuing a cybersecurity career at NPPD. This webinar will feature a panel of NPPD employees who will share their experiences in cybersecurity and career paths at NPPD. In addition, human resource officials will explain the federal application process and highlight NPPD career pathways for students and recent graduates.

This event is free for participants. To register, click here. As space is limited, it is recommended you register soon.

RMU Spring Career Fair

February 27, 2018
Yorktown Hall – Moon
12:00 pm to 3:00 pm

For RMU students and alumni only!

Here is a list of employers that will be attending:

#1 Cochran
All Lines Technology
Allegheny County Airport Authority
Allegheny County Department of Human Services
Allegheny Intermediate Unit
Auto-Owners Insurance Company
Autosoft, Inc.
Beaver County YMCA
BKD LLP: CPAs & Advisors
Black Knight Security
Callos Resource
Champion Windows, Sun Rooms, and Home
Citizens Bank
City of Pittsburgh
Comcast Cable
Commonwealth of PA, Pennsylvania State Police
Community Living and Support Services (CLASS)
Corazon, Inc.
Creehan & Co.
Crown Castle
Dedicated Nursing Associates, Inc. (DNA)
DiNuzzo Index Advisors, Inc.
Dollar Bank
DVSport, Inc.
Eat’n Park Hospitality Group
Elite Transit Solutions
Enterprise Rent-A-Car
Equipment & Controls, Inc.
Erie Insurance Group
Express Employment Professionals
Fairmont Hotels & Resorts
Farmers Insurance Group
Fastenal Company
First Commonwealth Bank
Foresters Financial Services, Inc.
Foundation of HOPE
Fraternal Order of Police Lodge #1 Pittsburgh
Glade Run Lutheran Services
Gordon Food Service
Greater Pittsburgh Community Food Bank
Heartland Restaurant Group
Highmark Health
Hub Group
Huntington National Bank
In Vision Human Services
Kelly Educational Staffing
Loomis U.S.
M&T Bank
MassMutual Pittsburgh
Matrix Solutions
McConway & Torley, LLC
Metro Benefits, Inc.
Mondelez International (formerly Kraft Foods)
Northwestern Mutual – Pittsburgh
Novitas Solutions
Office of the Comptroller of the Currency (OCC)
Ohio Valley Hospital
Pittsburgh Marriott City Center
Pittsburgh Mercy Health System
PNC Financial Services Group
Pocket Nurse
Presbyterian Day School
Promise Camp by Family Guidance
Prospera Hospitality
Providence Point
Prudential Advisors
Rivers Casino
RMU Center for Global Engagement
S&S Flooring (Stack & Stack Gym Flooring)
SingleSource Property Solutions
Skechers USA
Southwestern Human Services
Speedway LLC
SunTec Business Solutions Private Limited
Superbolt Inc.
Tender Care Learning Centers
The Academy Schools
The Home Depot
Trinity School for Ministry
U.S. Army
VA Pittsburgh Healthcare System
Vertical Solutions
Waste Management of PA
West Shore
WVU Medicine
YMCA Sewickley Valley
ZOLL LifeVest


bit-x-bit Presentation – A TSC Sponsored Event

The Top Secret Colonials will be sponsoring a presentation by bit-x-bit which will be held on Thursday, January 25th from 4:30 – 5:30 pm in the Wheatley Atrium. bit-x-bit will be discussing how to handle a digital forensic investigation from start to finish, including the intake of evidence and preparing forensic images.

bit-x-bit is a Digital Forensics and e-Discovery consulting company, finding evidence in internal investigations and in cases of data theft and security breaches. The legal and technical teams at bit-x-bit have successfully completed hundreds of forensic investigations and e-discovery projects, ranging in scope from investigating the metadata in one file to the collection, culling and analysis of millions of electronic documents. bit-x-bit has provided e-discovery and computer forensics training to the United States District Court, government agencies and major law firms.

There will be two presenters from bit-x-bit at this event:

Brett Creasy – President and Director of Digital Forensics. Brett has over ten years of IT and Digital Forensic experience with degrees from Pittsburgh Technical Institute, Villanova University and Capella University.

Caitlin Counihan – Digital Forensic Analyst. Caitlin has been with bit-x-bit for over a year and graduated from RMU in 2016.

Students will receive SET credit for attending this event, and pizza will be provided. For more information about this event, contact Dr. Paullet at For more information about bit-x-bit, click here.

Stockings for Soldiers

Sadly, there are many soldiers overseas that will not be home for the holidays. The Top Secret Colonials are collecting stockings to send to the soldiers. If you would like to fill a stocking for a soldier, you can pick one up in Dr. Paullet’s office (Wheatley 229). The stockings must be returned to her office by December 5th to be shipped.

Below is a partial list of items that are needed:

– Oreos, Chips Ahoy, Nutter Butter Cookies
– Trail Mix
– Beef Jerky
– Granola Bars
– Breakfast Bars
– Slim Jims
– Twizzlers
– M&M’s (all flavors) – other chocolate will melt
– Pop Tarts
– Cards
– Crossword Puzzles
– Soduko
– Gum
– Caramel Popcorn
– Gummie Candy
– Chapstick
– Hot Cocoa Mix, Lemonade packets, etc.
– Nuts
– Pretzels
For more information, contact Dr. Paullet at

RobotTutor Talk on November 15th

As part of the RMU Entrepreneurship Week 2017, The Massey Center for Entrepreneurship and Innovation in collaboration with the RMU ACM (Association of Computing Machinery) Chapter housed in the Department of Engineering – SEMS, cordially invite you to attend an exciting talk discussing RobotTutor, 2017 $1M Xprize Winner.
Wednesday 11/15/2017
10:00am to 11:30 am
Room: Franklin 203

SET credit available

Cyber Security Presentation – Monday, November 13th

On Monday, November 13th, there will be a presentation by an employee from a major financial institution. He will discuss how the Cyber Security division of organizations operates along with detailing the varying arms of an organization’s Cyber Division to include cyber forensics, counterintelligence and insider threats. The presentation will take place in the Wheatley Atrium from 4:15pm to 5:30 pm.

One hour of SET credit can be earned. Refreshments will be served. This is a Top Secret Colonials event. For more information, contact Dr Paullet at

Highlights: Splunk Presentation with U.S. Steel’s James Wolfe

This event was held October 26th, and in case you missed it, here are some of the highlights to be taken away from the presentation.  So, if you were in class and regretted now skipping class for this, we have got you covered!

Main Points:

  • Searches – he discussed how when you use the search bar, it is important to understand its format:
    • [general code] | [less general] | [continually more specific search]
    • as you can tell, the idea is that there are commands that you use that are processed from left to write, and each command is separate by the |(pipe).
  • Save searches! – with there being so many different ways to slice all of the network traffic that Splunk is managing, having different frequented searches saved is very convenient to insure more time searching network traffic, and not google for Splunk commands.
  • Statistics – in order for anomaly detection to work, there needs to be an idea of what is normal.  One person’s smile could be another person’s bad-day face.  It is important to judge off of what is normal for the network traffic, much like judging someone’s behavior off of what is normal for that person.  The statistics generated are what determines what falls within normal behavior for their network.
  •  Real-time Graphs & Charts – generating graphs and charts that will actually change and adjust in real time are super important.  It allows an easy way to understand what is going on in the network – instantaneously.  Wolfe stressed that bosses will love something so clean, visually appealing, and content-specific.

Splunk application:

This presentation was about Splunk, the security event manager/log aggregation software.  If you have had Paullet’s class and suffered through the wonderfully challenging Enron emails assignment, then you have had a small taste of this software’s capabilities.  Splunk can be used for a wide variety of applications because of its ability to organize/index large sums of information with ease into databases, or indexes.  James Wolfe focused on Splunk’s network security applications.  James Wolfe is a security administrator for U.S. Steel, so his job requires him to focus on network traffic such as IPs, users, or anything that could potentially indicate a point of failure for their network.  Wolfe explained that the beauty of Splunk is that you can start looking without needing to know exactly what it is that you are looking for – exactly how I described my use of Splunk when trying to find incriminating Enron emails.  Because security is the importance of the job, he discussed the commands that would be useful for security.  These things included:

  • dedup – removes duplicates in your search.
    • EX: dedup user, src_ip
  • wineventlog
    • 4625 – this code indicates a failure to log in

A very basic example shown to us to show how the data was being used to detect anomalies was through the ratio or successful to unsuccessful log ins for users.  By creating a baseline formula for the rate of successful logins for each user, the computer can flag any time there is a change in this rate that goes within 1-2 standard deviations.  The data is all producing algorithms and equations based on what you – the user of the Splunk software – deems important.

  • table_raw – views the raw informaiton that splunk pulled the information from for the databases/indexes

This raw information was very education in seeing how convenient the software is, because the raw version was pretty jumbled, messy, and difficult to understand.

Career Advice:

  • Deskside/IT support is a good career start – you learn to troubleshoot
  • Ask as many questions as you can – be willing to do projects; this will make you valuable.
  • CERTIFICATIONS: N+* – basic fundamentals of networking.
  • Government – certifications are legally required
  • CCNA – CISCO; mid-level
  • Maintain a strong work ethic
  • Log into a firewall – download free for home*
  • 2 year schools like ITT tech allows hands on experience
  • 4 year degree preferable, but less hands on – it proves that you are hardworking and willing to put in the time necessary; this ties in greatly with having a strong work ethic.
  • Microsoft imagine account; dream spark; 2016 data center OS worth $3,000 [we get it for free at RMU, so utilize it!]
    • Spin up a DHCE from home
  • All acronyms – know.
  • Splunk: just saying that you have worked with Splunk automatically gives you an edge against the competition for any job in security.
  • Google: useful; know that it really is alright to google what you do not understand when doing anything on the computer.  There is so much to know, and as long as you accept that you will be learning throughout your entire career, you will be able to stay in demand with employers.

Fun Facts:

  • Companies have filters on their employee’s computers preventing them from going on certain sites.  Because you cannot access these through google, users will use Bing as their loophole to sites that they are not supposed to access.
  • U.S. Steel, much like other companies, uses firewall redundancy to prevent any debilitating security errors.
  • Splunk is free to download; free for developers license. All software is free all you need is to buy your own server with 16 gigs – plenty for an at home – of ram.  Buy second NIC. Spin up VMs. Download licenses.