Information Security Intern

New York

Applications have closed

DoubleVerify

DoubleVerify is driven by a mission – to make the digital advertising ecosystem stronger, safer and more secure.

View company page

Information Security Intern

 

Who we are

DoubleVerify is a leading software platform for digital media measurement, data, and analytics. DV’s mission is to be the definitive source of transparency and data-driven insights into the quality and effectiveness of digital advertising for the world’s largest brands, publishers, and digital ad platforms. DV’s technology platform provides advertisers with consistent and unbiased data and analytics that can be used to optimize the quality and return on their digital ad investments. Since 2008, DV has helped hundreds of Fortune 500 companies gain the most from their media spend by delivering best-in-class solutions across the digital advertising ecosystem, helping to build a better industry. Learn more at www.doubleverify.com.

Job Overview

 

The cybersecurity internship is an opportunity that introduces aspiring cybersecurity professionals to the day-to-day operations of security within DV. 

 

Interns are primarily exposed to frontline duties associated with cybersecurity practices and are introduced to the processes of event assessment and escalation (when warranted) to senior members of the cybersecurity team. 

 

The internship is a fantastic opportunity to learn firsthand how cybersecurity controls are implemented, managed and enhanced across the business. 

 

Working alongside one or more mentors, interns perform data collection, ticket processing, analysis, and remediation tasks. Interns also work with cybersecurity team members to understand architectural designs and best practices. Interns provide support to the security operations, application security, governance/risk/compliance (GRC), SecOps, and IT security teams. 

 

To be effective, interns must have a general understanding of cybersecurity principles and concepts, as well as solid practical hands-on experience with computers.  



What you’ll do

  • Interview each member of the information security team. 
  • Learn about the various tools/technologies being leveraged by the team, and build out a wiki regarding their capabilities for internal DV employee's knowledge. 
  • Update existing DV Cyber web page with current information
  • Attend internal meetings with the Application Security Manager and shadow tasks
  • Identify and define assets type, tags, technologies & product category for our vulnerability management program.
  • Expand Tagging data by importing data from 3rd party vendors via API.
  • Build security awareness material.

Qualifications

 

  • Successful completion of undergraduate coursework (or reputable trade program) in cybersecurity
  • Fundamental knowledge of cybersecurity principles and best practices
  • Basic understanding, knowledge of, and hands-on capabilities with operating system configuration (Windows, Unix, Linux) and networking (DNS, DHCP, routing protocols).
  • Ability to write and publish technical documentation effectively
  • Communicate to team members regularly 
  • Basic exposure to one or more scripting languages (e.g., Python, PowerShell and Bash) is preferred.
  • Proven trustworthiness and history of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
  • Confident, but humble and willing to learn and take initiative
  • Good to have knowledge of the following technologies: Splunk, Kafka
  • Bonus-Experience: obtainment of or training for cybersecurity certifications 

Tags: Analytics APIs Application security Bash Compliance DNS Governance Linux PowerShell Python Scripting SecOps Splunk UNIX Vulnerability management Windows

Perks/benefits: Salary bonus

Region: North America
Country: United States
Job stats:  21  13  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.