Information Security Intern
New York
Applications have closed
DoubleVerify
DoubleVerify is driven by a mission – to make the digital advertising ecosystem stronger, safer and more secure.Information Security Intern
Who we are
DoubleVerify is a leading software platform for digital media measurement, data, and analytics. DV’s mission is to be the definitive source of transparency and data-driven insights into the quality and effectiveness of digital advertising for the world’s largest brands, publishers, and digital ad platforms. DV’s technology platform provides advertisers with consistent and unbiased data and analytics that can be used to optimize the quality and return on their digital ad investments. Since 2008, DV has helped hundreds of Fortune 500 companies gain the most from their media spend by delivering best-in-class solutions across the digital advertising ecosystem, helping to build a better industry. Learn more at www.doubleverify.com.
Job Overview
The cybersecurity internship is an opportunity that introduces aspiring cybersecurity professionals to the day-to-day operations of security within DV.
Interns are primarily exposed to frontline duties associated with cybersecurity practices and are introduced to the processes of event assessment and escalation (when warranted) to senior members of the cybersecurity team.
The internship is a fantastic opportunity to learn firsthand how cybersecurity controls are implemented, managed and enhanced across the business.
Working alongside one or more mentors, interns perform data collection, ticket processing, analysis, and remediation tasks. Interns also work with cybersecurity team members to understand architectural designs and best practices. Interns provide support to the security operations, application security, governance/risk/compliance (GRC), SecOps, and IT security teams.
To be effective, interns must have a general understanding of cybersecurity principles and concepts, as well as solid practical hands-on experience with computers.
What you’ll do
- Interview each member of the information security team.
- Learn about the various tools/technologies being leveraged by the team, and build out a wiki regarding their capabilities for internal DV employee's knowledge.
- Update existing DV Cyber web page with current information
- Attend internal meetings with the Application Security Manager and shadow tasks
- Identify and define assets type, tags, technologies & product category for our vulnerability management program.
- Expand Tagging data by importing data from 3rd party vendors via API.
- Build security awareness material.
Qualifications
- Successful completion of undergraduate coursework (or reputable trade program) in cybersecurity
- Fundamental knowledge of cybersecurity principles and best practices
- Basic understanding, knowledge of, and hands-on capabilities with operating system configuration (Windows, Unix, Linux) and networking (DNS, DHCP, routing protocols).
- Ability to write and publish technical documentation effectively
- Communicate to team members regularly
- Basic exposure to one or more scripting languages (e.g., Python, PowerShell and Bash) is preferred.
- Proven trustworthiness and history of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
- Confident, but humble and willing to learn and take initiative
- Good to have knowledge of the following technologies: Splunk, Kafka
- Bonus-Experience: obtainment of or training for cybersecurity certifications
Tags: Analytics APIs Application security Bash Compliance DNS Governance Linux PowerShell Python Scripting SecOps Splunk UNIX Vulnerability management Windows
Perks/benefits: Salary bonus
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Ethical hacker / Pentester H/F jobs
- Open Information Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Senior Information Security Analyst jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Sr. Security Engineer jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Senior Cyber Security Specialist jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Windows-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open CI/CD-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs