Cybersecurity Summer Intern

POL - Gdansk

Applications have closed

Intel

Intels Innovation in den Bereichen Cloud-Computing, Rechenzentren, Internet der Dinge und PC-Lösungen macht die intelligente und vernetzte digitale Welt von heute möglich.

View company page

Job Details:

Job Description: 

About the Internship: Our Intel Product Assurance and Security group is looking for an aspiring cybersecurity engineer that will work with us to help us with our security research activities. The Intel Product Assurance and Security group is responsible for making sure Intel products adhere to highest security standards and is tasked with staying ahead of the ever-evolving threat landscape. Our architects, security researchers and cryptographers influence security features of Intel products and collaborate with business unit partners during all stages of product development lifecycle. This summer internship lasts 3 months: 1.07.24 - 30.09.24 and you'll be with us part-time - 35h/week. Candidates must be based in Poland upon the start date of this internship and for its duration. There might be a first month of on-site integration in Gdansk. We will provide you with all the necessary equipment and a place to stay at the student dormitory at Politechnika Gdanska. During the internship, you will be working closely with our IPAS Cryptography Team experts on tasks related to the daily activities of our team.

Qualifications:

We welcome applications from candidates with:

  • Background in Mathematics and Computer Science with focus on discrete math and programming
  • Understanding of basics of cryptography
  • Analytical thinking, ability to simplify problems and distinguish essential from accidental properties of studied situations
  • Experience with programming in any mainstream language


It would be an advantage if you had interest and prior experience with:

  • Threat models and adversarial analysis of systems
  • Practical security research skills as demonstrated by e.g. participation in CTF competitions, own security research results
  • More in-depth knowledge of cryptography
  • Experience with various software development tools from git though programming languages, scripting tools and automation of issue tracking systems Communication skills needed to clearly explain your ideas to others when speaking and in writing

          

Job Type:

Student / Intern

Shift:

Shift 1 (Poland)

Primary Location: 

Poland, Gdansk

Additional Locations:

Business group:

Enable amazing computing experiences with Intel Software continues to shape the way people think about computing – across CPU, GPU, and FPGA architectures. Get your hands on new technology and collaborate with some of the smartest people in the business. Our developers and software engineers work in all software layers, across multiple operating systems and platforms to enable cutting-edge solutions. Ready to solve some of the most complex software challenges? Explore an impactful and innovative career in Software.

Posting Statement:

All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.

Position of Trust

N/A

Work Model for this Role

This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. In certain circumstances the work model may change to accommodate business needs.

Tags: Automation Computer Science Cryptography CTF Mathematics Scripting

Perks/benefits: Career development

Region: Europe
Country: Poland
Job stats:  50  16  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.