The Top Secret Colonials will be having a 12-Hour Gaming Charity Marathon on Saturday, March 19th from 11am-11pm at Yorktown’s Ferris Ballroom. It costs a $5 donation to attend. You can RSVP or send questions to jtwst256@mail.rmu.edu.

The Top Secret Colonials will be having a 12-Hour Gaming Charity Marathon on Saturday, March 19th from 11am-11pm at Yorktown’s Ferris Ballroom. It costs a $5 donation to attend. You can RSVP or send questions to jtwst256@mail.rmu.edu.

The Top Secret Colonials are sponsoring a Buffalo Wild Wings Day/Night at the BWW in Robinson on Tuesday, March 22nd from 11am – close. BWW will give TSC 10% of the proceeds in sales. In addition to the proceeds, there will be a raffle, including:
$50.00 – Southwest Gift Card
$50.00 – Eat’n Park Gift Card
$25.00 – Buffalo Wild Wings Card
$25.00 – Game Stop Gift Card
$25.00 – Best Buy Gift Card

Resco Products, Inc. is seeking recent graduates and/or upcoming May 2016 graduates for an IT Applications Support Specialist position.
Job Summary
This position is a critical part of Resco’s IT team by providing support, testing, implementation and troubleshooting for business critical applications including but not limited to ERP, business intelligence, and Salesforce.com software. This technical and analytical role will be responsible for supporting key components of the business in the definition, development and implementation of business technology solutions and for maintaining systems. In addition, this position provides assistance to other members of the IT team for network support. Will report directly to the Information Technology Manager.
Requirements:
The following qualifications would be a plus: A+ Certification, Experience with BI software, Knowledge of QAD enterprise applications, SQL or Progress 4GL knowledge and experience
To Apply:
Please send resume and letter of interest to:
Dan Wertz, IT Manger: dan.wertz@rescoproducts.com
Please contact the Career Center for more information at careers@rmu.edu or call 412-397-6333.
HM Health Solutions, a subsidiary of Highmark Health, is committed to excellence in delivering innovative solutions to enable health plans achieve top-line revenue growth, reduce costs and gain economies of scale. With industry-leading expertise, HM Health Solutions delivers measurable results while increasing customer engagement. Its extensive portfolio includes enterprise services, infrastructure management, data center housing and print management.
HM Health Solutions is seeking knowledgeable, creative individuals to join us as we continue to power the future of health care. Opportunities exist at all levels, from experienced professionals to internships, and also with our Rotation Program for high-potential recent college graduates. We are also looking to fill multiple roles in the areas of Cyber Security and Information Access Management. The event will be held on Tuesday, March 15th from 4:00 – 5:45 PM in the Wheatley Atrium.
Here is the schedule of events:
4:00 – 4:15 PM – SET Registration and free pizza
4:20 – 5:00 PM – Highmark Presentation
5:00 – 5:45 PM – Q & A session
A 25% tuition discount and free Summer housing is being offered to students enrolled in Summer 2016 Academic Internship programs.
Students must be enrolled in a minimum of six (6) academic credits or a minimum of three (3) internship credits this summer.
Please contact the Student Financial Services office at 412-397-6260 or stacct@rmu.edu.
Robert Morris University’s online Bachelor in Cyber Forensics & Information Security Degree ranked #6 of “The 12 Best Online Bachelor in Information Assurance & Security Degree Programs” by TheBestSchools.org.
TheBestSchools.org selected RMU’s program based on several weighted factors, including academic excellence, course offerings, faculty strength, and reputation, including reputation for online degree programs.
Comparable programs that were compared to RMU cover similar subjects such as data protection, software security, hackers, Internet security, network security, network and computer forensics, security infrastructure design, e-commerce, and telecommunication systems. The programs also cover ethical and legal responsibilities.
Read the article here:
http://www.thebestschools.org/rankings/best-online-bachelors-information-assurance-security-degree-programs/
SANS is hosting an upcoming academy sponsored by Solutionary in Pittsburgh. Those that apply for and are accepted into the SANS CyberTalent Immersion Academy receive a world-class education in the booming Cyber Security field, full tuition reimbursement, and most valuable, a guaranteed employment opportunity upon completion. This academy is part of the SANS VetSuccess program, for students who are also military veterans or involved with the National Guard/Reserves.
SANS is the most trusted and by far the largest source for information security training and security certification in the world. The SANS VetSuccess Immersion Academy provides U.S. military veterans with advanced technical training, industry-recognized certifications, and connections to high-paying jobs and rewarding careers in cybersecurity. The Academy is 100% scholarship-based, and includes two to three SANS training courses taught by expert faculty as well as the associated GIAC certifications.
They are currently seeking qualified candidates to apply. The timing of this program is great for students who are graduating in the spring, and of course the program is also open to alumni and community members.
To learn more about the VetSuccess Academy, or to apply, please visit https://www.sans.org/cybertalent/immersion-academy/programs#pittsburgh
Applications are due by April 29, 2016
A new internship opportunity has been posted for students interested in Data Analytics. Othot, a predictive analytics start-up, is currently seeking candidates for an opening as a Data Science Intern. The position will assist in the building of predictive models. The candidate will be expected to work 10-15 hours a week on-site at Othot’s office in Greentree. The starting wage is $10/hour. Othot states that they are looking for “a smart, energetic person who wants to work in a fast-paced startup environment.”
Candidates will be expected to:
– Assist Senior Data Scientists with building, applying, and assessing predictive models
– Analyze data sets using in-house developed solutions
– Determine which data from the customer, Othot data repositories, and other external sources are relevant to an analysis
– Extract and store data from web APIs using Python programming
– Interpret and communicate results of predictive modeling to customers in a way that is easy to understand
– Develop methodologies and tools for assessing model performance
– Explore new predictive analytic methods
– Participate in user interface development
Qualifications for the position include (but are not limited to):
– Experience working with statistical analysis, data science, machine learning, and/or related fields
– Interest and/or familiarity with developing predictive algorithms and models
– Experience with Python programming and libraries for working with data (e.g., scikit-learn and pandas) preferred
– Ability to leverage current and emerging technology
– Strong communication and interpersonal skills
– Capacity to work independently and/or as part of a team
Interested candidates should send their resume and cover letter to Mark Voortman at mvoortman@othot.com
What is the fuss about? The reason that the FBI and Apple are in a heated debate is over one iPhone, but it is much more than that. The argument began after a shooting in San Bernardino, California on December 2, 2015. Considered as the worst mass shooting in modern US history since 2012, says NBC, the shooting ended with 14 killed and 21 wounded. The 2 suspects for the shooting were both killed in a gun fight with policemen. Terrorism is suspected (Ortiz, 2015). With the FBI’s hands on the iPhone of one of the suspects, the FBI is desperately trying to gain access to the information on it to see if there was another shooter; law enforcement had previously believed that there may have been 3 shooters rather than just 2 (Ortiz, 2015).
In order to collect this information, the FBI needs access to the iPhone. However, they are are struggling to gain access. The FBI had contacted Apple and asked that they help them get information off of the device. When asked, Apple denied helping, claiming that the FBI wants them to create a backdoor to get into all iPhone products. The issue here is that iPhones are encrypted.
Why is this topic so controversial? This topic is so controversial because it goes so much further beyond just one simple iPhone; this situation magnifies the debate of security versus privacy. This is something that the US government has been in turmoil over for years, especially when terrorism is involved.
The FBI is more concerned with security over privacy, while Apple is more concerned with privacy over security. The FBI wants access to an iPhone that they have been locked out of when they reset the iPhone’s password when attempting to get into it. Unfortunately, Apple says that since the password has been reset, there is no longer a connection to the cloud information because there is a password disconnect (Burchette, 2016). This is why the FBI has asked for a program to hack into the encrypted iPhone. This is also why Apple is non-compliant .
Apple has exposed this situation because this shows a government that is no longer concerned with privacy, or with the consequences of creating such a program. The difficulty of the matter is that this all comes back around to the Patriot Act, an amendment to the United States’ Electronic Communication Privacy Act (ECPA). The Patriot Act has been around to create a loop hole for the Wiretap Act in order for law enforcement to surpass the need for a warrant for wiretapping, if there is suspected terrorism (Craig, 2013). Given the controversy of this Act, there is clarity as to why this iPhone dilemma has gotten so big.
Can you see both sides? Of course. This entire thing has two different ways of looking at one case:
What is happening as of right now? People have begun picking sides, and sticking to them. Apple has written up its legal response detailing their refusal to the FBI’s request(s) (Heisler, 2016). The FBI has continued to defend itself, claiming that it is not asking for a backdoor into all iPhones, but means to get into this one in particular.
All in all… This is a highly controversial topic and it is going to be one of many cases that will further influence the Crypto Wars, the battle between privacy-minded technologists and the U.S. government (McLaughlin & Froomkin, 2016).
__
Sources:
Burchette, J. (2016, February 21). FBI Admits It Reset San Bernardino Shooter’s iPhone Password. Retrieved from The Wrap: http://www.thewrap.com/fbi-admits-it-reset-san-bernardino-shooters-iphone-password/
Craig. (2013). Cyber Law: The Law of the Internet and Information Technology First Edition (pp. 92-131). Pearson.
Heisler, Y. (2016, February 25). Here’s Apple’s long-awaited legal response to the FBI. Retrieved from BGR: http://bgr.com/2016/02/25/apple-vs-fbi-legal-filing/
McLaughlin, J., & Froomkin, D. (2016, February 26). FBI vs Apple Establishes a New Phase of the Crypto Wars. Retrieved from The Intercept: https://theintercept.com/2016/02/26/fbi-vs-apple-post-crypto-wars/
Ortiz, E. (2015, December 3). San Bernardino Shooting: Timeline of How the Rampage Unfolded. Retrieved from NBC News: http://www.nbcnews.com/storyline/san-bernardino-shooting/san-bernardino-shooting-timeline-how-rampage-unfolded-n473501
CMU’s Summer Security Intensive is an opportunity provided for current juniors, who are pursuing work in the Cyber Forensics and CIS fields of work. The SSI is a paid summer fellowship, provided by CMU. The total that can be earned from participating in this fellowship is around $2500. Heinz college provides financial aid for all of those accepted into the program which can cover all participation costs, transportation, housing, meals, tuition, books, other supplies, social functions, and also a 1,000 stipend.
Participants will go to classes and get to meet and gain experience with some of the most skilled professionals in the cyber security field. The three classes that SSI participants will take will focus on security topics, that are issues that many students and professionals alike face.
THE DEADLINE TO APPLY FOR THIS OPPURTUNITY IS MARCH 1ST.
To apply for this fellowship, follow the link here.
Again the opportunity to apply for this fellowship is quickly approaching, and those interested should apply immediately.