Paid Cyber Security Summer Fellowship at CMU

Carnegie Mellon University (CMU) is hosting a summer fellowship aimed at cyber security students who will be seniors in the Fall of 2016. The IT Lab: Summer Security Initiative (SSI) is a roughly six week program that will be taking place from June 19, 2016- July 30, 2016.

SSI is an opportunity for participants to engage in a unique environment that will prepare them for careers post-school. Interaction with some of the world’s most foremost information security experts will be a daily occurrence and a majority of them will be teaching the program’s daily classes. If all of this wasn’t enough to convince future seniors to apply, keep in mind that students who complete the SSI program will be eligible to receive a scholarship of at least 50% of tuition to CMU’s Heinz College to pursue a master’s degree.

Important Information:
Deadline to apply:        March 1, 2016
Dates:                             June 19, 2016 – July 30, 2016
Requirements:             Participant will be a senior in Fall 2016
Financial Information:   All costs of housing, meals, tuition, books, and travel to and from CMU will be covered
Other compensation:    Participants will receive $1000 for participating

The application process can be found at:
http://heinz.cmu.edu/school-of-information-systems-and-management/itlab/itlab-application/index.aspx

Good luck!

Mylan Intern Networking Night – February 4th

Mylan is holding an Intern Networking Night on Thursday, February 4th at the Robert J. Coury Global Center at Southpointe. Registration and refreshments will be held from 4:30-6pm and networking will be from 6-7:30pm.

Please RSVP for this event by Monday, February 1st at https://www.surveymonkey.com/r/B8GBWKS.

Registration is limited and will be on a first come, first served basis. Register early to ensure you will have the opportunity to speak with leaders from your area of interest.

More information is included in this flyer: Mylan Intern Networking Night Flyer

Software Engineer/Database Developer at mSE North America Inc

mSE North America, Inc. is currently looking for applicants to fill openings for Software Engineer and Database Developer positions.  If interested, please apply soon because the application ends on 1/31/2016.  Below is all of the information one will need to consider before applying.  The position is located in Pittsburgh and is full-time.  If interested in applying, send your resume to Hdsluma@mse-solutions.com  

Some of the major tasks of the positions include:

  • Performing application software development and system enhancements in a distributed platform environment across multiple technologies
  • Perform application software development for large scale applications
  • Code management and coordination across multiple branches of code.
  • Technology quality assurance review and testing utilizing a variety of tools (for example: TOAD, Dos command, IPSwitch, WinSCP, terminal server technology)
  • Coordinate on site and off shore teams that may consist of internal or external personnel or peers who code, test, and debug from specifications

Some additional responsibilities include:

  • Develop complex software, performed across a variety of technology platforms, and create system design, coding, system testing, debugging and data transformations
  • Translate business requirements into specific systems, applications or process designs; perform gap analysis and identify technology components needed to support business
  • Full technical knowledge of all phases of applications systems analysis and programming; good understanding of the function for which application is designed, that are PL/SQL or database based
  • Implement software development best practices and lessons learned as a means continuous improvement

Qualifications:

  • a degree in a degree in (business) information technology, business informatics, or a similar degree.
  • Ideally > 5 years / minimum 3 years – experience in database development or respective consulting practice

Specialized knowledge and skills:

  • Bachelor’s degree or equivalent in an IT-related field with 3+ years related experience
  • Advanced and thorough understanding of IT concepts, including database concept structures software/application development techniques and testing techniques
  • Strong understanding of 4th generation language software development, like Powerbuilder, VBA, etc.
  • Strong verbal and written communications skills
  • Must have the ability to interact with all levels of management and teams

Special Job Requirements:

  • 3+ years of Oracle PL/SQL development experience
  • 3+ years of application software development, systems analysis, design/test experience and/or other related IT experience is required.
  • Experience with projects that involve large batch processes in Oracle PL/SQL
  • Experience handling and managing large volumes of data processing, tuning high-volume near real-time applications for performance and instrumentation of code for tuning and monitoring.
  • Data Warehousing experience a plus

Language skills:

  • English: biz fluent
  • Advantage: German: good

Soft skills:

  • Analytical thinking
  • Readiness of mind
  • Coordination / management
  • Flexibility
  • Prudence/reliability
  • Ability to work under pressure
  • Communication / Presentation
  • Willingness to perform
  • Customer orientation
  • Drive for results / dedication
  • Independence
  • Ability to work in teams
  • Personnel management
  • Embraces change
  • Willingness to learn

 

Web Development Opportunity

An alumni-led group is looking to add a web developer onto their team. This will be a project based job with possibility of recurring employment for future updates and development.

The performance specifications for this project include: It must have account management with an integrated chat system. It must be able to safely handle credit card information, it also must be able to have our customers search for user listed items as well as search the web for comparative pricing from companies such as Amazon.

There will be compensation for the project and can be discussed further upon meeting.

If you are interested and feel you have the requisite skills, please contact Karl Renner – 412-965-7288 or BNDRbooks@gmail.com.

Cybergenetics – Computer Programmer Position

Cybergenetics is a local biotechnology company with offices located in Oakland.  They mainly do work with DNA evidence in forensics.

Job Description:  

Cybergenetics is seeking a computer programmer with 2-4 years of experience.  They will be helping to maintain biotechnology software products, with a possibility that some development may be needed.  The programmer will help to maintain existing MATLAB software that includes a relational database with a graphical user interface.

Job Requirements:

Seeking candidates that have good quantitative skills, an interest in scientific applications, and experience in analyzing real data. They should be able to work well independently and in groups. An MA or MS degree in a science or engineering field is preferred.  Experience in Macintosh, Windows, and UNIX operating systems, MATLAB, Java, and SQL programming languages, and some familiarity with computer science, databases, user interface development, and the software life cycle.

Visit the Cybergenetics Website(www.cybgen.com)  for more information, and emailresumes to  jobs@cybgen.com

Department of Homeland Security Secretary’s Honors Program Cyber Student Volunteer Initiative

The U.S. Department of Homeland Security (DHS) has launched the 2016 Secretary’s Honors Program Cyber Student Volunteer Initiative. The initiative targets current undergraduate and graduate students and is a part of the Department’s efforts to build a cybersecurity talent pipeline by working with secondary and post-secondary institutions and other key partners in academia and the private sector.

Through the Secretary’s Honors Program Cyber Student Volunteer Initiative, students are able to learn about the DHS cybersecurity mission by completing hands-on cybersecurity work and building technical experience in key areas such as digital forensics, network diagnostics, and incident response.

In the 2016 Cyber Student Volunteer Initiative program cycle, over 80 student volunteer assignments are available at over 40 local DHS field offices across the country and eight participating DHS Components, to include Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), National Protection and Programs Directorate (NPPD), Office of the Chief Information Officer (OCIO), Office of Intelligence and Analysis (I&A), Office of Policy/Cyber, Infrastructure and Resilience Policy, Transportation Security Administration (TSA), and United States Coast Guard (USCG).

The Cyber Student Volunteer Initiative application period is open until January 29, 2016 through the USAJOBS portal (https://www.usajobs.gov/GetJob/ViewDetails/425296700).

For more information, contact the DHS CyberSkills Management Support Initiative (CMSI) at CMSI@hq.dhs.gov

Data Privacy Day – January 28th

The Top Secret Colonials are promoting a data privacy awareness day on January 28th. Data Privacy Day is meant to help raise the public’s awareness around data security and educate all internet users to be safer online. This day also aims to encourage greater accountability among consumers to better perceive how their information is being shared.

On January 28, the National Cyber Security Alliance (NCSA) will host events in Washington, DC and Los Angeles where privacy professionals will explain solutions to current challenges as well as best practices, such as how to recognize cyber intrusions and establishing an incident response plan. NCSA will also hold Twitter chats centered around data privacy in the days leading up to Data Privacy Day.

Data Privacy Tips (from StaySafeOnline.org):

  • Share with Care
    • What you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.
    • Own your online presence: Set the privacy and security settings on web services and devices to your comfort level for information sharing. It’s ok to limit how and with whom you share information.
    • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful when and how you share information about others.
    • Post only about others as you have them post about you: The golden rule applies online as well.
    • Own your online presence: It’s OK to limit who can see your information and what you share. Learn about and use privacy and security settings on your favorite online games, apps and platforms.
  • Personal Information Is Like Money: Value It. Protect It.
    • Think before you act: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true or ask for personal information.
    • Get two steps ahead: Switch on two-step verification or multi-factor authentication wherever offered to prevent unauthorized access.
    • Know what’s being collected, who is collecting it and how it will be used: Information about you, such as the games you like to play, what you search for online and where you shop and live, has value ‒ just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites. Only use a product or service if the company is open and clearly states how it will use your personal information. If you’re not sure what a business will do with your information, ask your parents. Think twice if an app wants permission to use personal information (like your location) it doesn’t need before you say “OK.”
    • Secure your devices: Use strong passwords or passcodes or touch ID features to lock your devices. Securing your device can help protect your information if your device is lost or stolen and keep prying eyes out.
    • Get savvy about WiFi hotspots: Public wireless networks and hotspots are not secure – this means the possibility exists that anyone can see what you are doing on your laptop or smartphone while you are connected to it. Think about what you are doing and if you would want another person to see it. If you use public WiFi a lot, think about using a virtual private network (VPN) that provides a more secure WiFi connection.
    • Now you see me, now you don’t: Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Turn off WiFi and Bluetooth when not in use, and limit your use of free public wireless networks, which stores and locations can use to track what you do online.
    • When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way bad guys get access to your personal information. If it looks weird, even if you know the source, it’s best to delete.

Sources:

-http://associationsnow.com/2016/01/data-privacy-day-to-raise-publics-awareness-of-its-role-in-data-security/

-https://www.staysafeonline.org/data-privacy-day/privacy-tips/

The Black T-Shirt Cyber Forensics Challenge

The staff in Stevenson University’s Cyber Forensics program is working with the programs at approximately 50 other colleges and universities in launching The Black T-Shirt Cyber Forensics Challenge, which is a joint academic and industry contest designed to promote interest in digital forensics, foster relationships among academic institutions, develop relationships between academia and the corporate sector, and provide a valuable hands-on exercise for learning and training.

We are looking for teams of students between 1-3 members to enter the challenge. There is no cost and this would be a great way to raise awareness of your skills and the Top Secret Colonials. We are permitted to have multiple teams but the teams are NOT permitted to work together. The annual challenge, which has already been built for this year, will run from January 1, 2016 to April 1, 2016. Challengers can register at any time in that window; once registered, links will be provided to download the data. Submissions will be due on April 1. The results will be scored in the month of April 2016.

Tools will not be provided but you can use FTK, the Password Recovery Toolkit, Splunk, DEFT, Autopsy, etc. to analyze the images. Teams are permitted to use whatever tools and methods they choose but they must be available and able to be recreated by the judges. Each member will receive a Black Cyber Forensics Challenge t-shirt.

This year’s contest involves confirming allegations of an exfiltration of company information by analyzing two computer images and network traffic. Point structure hasn’t been released yet. In addition to the main challenge, “Mini” Challenges” will be run throughout the year. These are similar to the annual challenge but smaller. The fall challenge for next year involves an executive returning from a business trip to find that there were very strange charges on her phone bill that she did not make.

More details can be found online at http://cyberforensicschallenge.com. Please email Dr. Paullet (paullet@rmu.edu) immediately so we can start forming teams.

Department of Homeland Security Secretary’s Honors Program Cyber Student Volunteer Initiative

The U.S. Department of Homeland Security (DHS) is preparing to launch the 2016 Secretary’s Honors Program Cyber Student Volunteer Initiative. The initiative targets current undergraduate and graduate students and is a part of the Department’s efforts to build a cybersecurity talent pipeline by working with secondary and post-secondary institutions and other key partners in academia and the private sector.

Through the Secretary’s Honors Program Cyber Student Volunteer Initiative, students are able to learn about the DHS cybersecurity mission by completing hands-on cybersecurity work and building technical experience in key areas such as digital forensics, network diagnostics, and incident response.

DHS will announce the start of the 2016 Secretary’s Honors Program Cyber Student Volunteer Initiative program cycle within the upcoming weeks on http://www.USAJOBS.com. Here is a flyer with more details: DHS Flyer.

For more information, contact the DHS CyberSkills Management Support Initiative (CMSI) at CMSI@hq.dhs.gov.

FedEx Presentation on Monday, December 2

FedEx will be on campus to give a presentation about their company and meet with students in the CIS department.  Please make room in your schedule to attend!

FedEx
Wednesday, December 2, 2015 (4:00 – 5:45pm)
Wheatley Center Atrium


4 pm – Registration and Pizza

4:15 pm – 5:15 pm – FedEx Presentation

5:15 pm – 5:45 pm – Q&A session


 

FedEx is currently seeking students interested in security, application development on all
platforms, and data analytics.

International student sponsorships available.

SET credit is available for attending this event.