Information Security Intern



From Aerospace, Space, Defence to Security & Transportation, Thales helps its customers to create a safer world by giving them the tools they need to perform critical tasks

View company page

Location: Toronto, Canada

Thales people architect solutions that support 85 million mainline and suburban passenger journeys, worldwide, every day. Our Rail Signalling and Communication systems are used on metro lines across major cities, and 72,000 kms of route, 52,000 trains per day in 16 countries are controlled by our Traffic Management Systems. Together We deployed the first-ever nationwide ticketing system which processes over 50 million ticketing transactions in 100 cities daily.

Thales provides world-leading Communications-Based Train Control (CBTC) and interlocking for mass rail transit applications globally. The Centre of Competence for Urban Rail Signalling is located right before you at mid-town Toronto. As the largest office in Canada, we house a department for every step of the Software Development Lifecycle (SDLC)! This includes Software, Hardware, Systems Design, Verification & Validation, Operations, etc. The supporting corporate shared services teams in Finance, Human Resources and IT is also located at the office. Our office space was designed to provide a sustainable, healthy workplace that expresses TRSS’s brand while increasing collaboration. Features include Greenguard furniture, EnergyStar appliances, low-emitting adhesives, sealants, and sliding glass doors on internal offices provide daylight and views to the outside. Come join the big Transport family, here in Toronto!

Our IT Cybersecurity family is seeking a Cyber Security Intern to join us for an 8 month internship at our Toronto office.

The successful student will report to the Chief Information Security Officer to support on multiple security initiatives in order to protect the business against threats, including Vulnerability Management, Identity and Access Management, Incident Response, Risk assessment and Threat management.

​With offices in Toronto, Vancouver and New York, our office spaces were designed to provide a sustainable, healthy workplace that increases collaboration. Features include Greenguard furniture, EnergyStar appliances, low-emitting adhesives, sealants, and sliding glass doors on internal offices provide daylight and views to the outside.

Key Responsibilities:

  • Support the Chief Information Security Officer on organizing metrics and reports on multiple indicators such as Incident Response, Vulnerability Management, IAM, and risk assessment

  • Review risks with risk owners and support on reassessing the risks

  • Work with multiple teams to address vulnerabilities and support on patch prioritization

Required Skills and Experience:

  • The successful candidate should have completed 2 years of a Bachelor's or college diploma in Computer Science, or equivalent working experience

  • Demonstrate knowledge on information security within the Prevent, Detect and Respond domains, and the following topics: Vulnerability detection lifecycle, Identity and Access lifecycle and management, redundancy concepts

  • Understand usage and applicability of the following systems: Active Directory, SIEM, AV/EDR, IPS, vulnerability scanners

  • Must be able to work in a hybrid environment and maintain full productivity

  • Able to work full time hours (40 hours) on the start date and for the agreed work term

  • Communication, negotiation and analytical skills

  • Must be highly analytical and detail-oriented, with organizational skills to manage assigned work to completion

Preferred Skills and Experience:

  • Demonstrate knowledge on the following topics, in addition: Security Operations, Incident Handling and Response, Governance, Risk and Compliance (GRC), Business Impact Assessment

  • Understand usage and applicability on the following systems, in addition: GRC solutions, NIST top 20 controls, OWASP Top 10, ISO27001

This position requires direct or indirect access to hardware, software, technology or technical data controlled under the Canadian Export Control List, Canadian Controlled Goods Program, International Traffic in Arms Regulations (ITAR) and/or the Export Administration Regulations (EAR). All applicants must be eligible, or able to obtain authorization, for such access including eligibility to the Canadian Controlled Goods Program.

Ce poste exige un accès direct ou indirect au matériel informatique, aux logiciels, à la technologie ou aux données techniques contrôlés en vertu de la Liste canadienne des marchandises et technologies d’exportation contrôlée, du Programme canadien des marchandises contrôlées, de la réglementation américaine lnternational Traffic in Arms Regulations (ITAR) ou de la réglementation américaine Export Administration Regulations (EAR). Tous les candidats doivent être admissibles à cet accès ou en mesure d’obtenir une autorisation pour un tel accès, y compris l’admissibilité au Programme canadien des marchandises contrôlées.



Thales is an equal opportunity employer which values diversity and inclusivity in the workplace. Thales is committed to providing accommodations in all parts of the interview process. Applicants selected for an interview who require accommodation are asked to advise accordingly upon the invitation for an interview. We will work with you to meet your needs. All accommodation information provided will be treated as confidential and used only for the purpose of providing an accessible candidate experience.

Apply now Apply later
  • Share this job via
  • or

Tags: Active Directory CISO Compliance Computer Science EDR Finance Governance IAM Incident response IPS ISO 27001 NIST OWASP Risk assessment SDLC SIEM Vulnerabilities Vulnerability management

Perks/benefits: Career development Startup environment

Region: North America
Country: Canada
Job stats:  41  10  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.