Sourcefire In Columbia, MD Seeks IT Interns
Two Great Part-time Positions
BELOW ARE TWO NEW INTERN POSITIONS POSTED ON UMBCworks. IF INTERESTED, APPLY ON UMBCworks TODAY!!!
If you have not met with The Shriver Center to get your resume reviewed for use on UMBCworks, click HERE
SUPPORT ASSISTANCE INTERN (position 9253352)
Want to help improve the quality of detection against live threats in the field for millions of users across the planet? Sourcefire has an internship for you!
We need a Snorthead who can help us manage the queue of rules-related issues that pop up from our support organization.
The successful applicant will already be familiar with Snort as an IDS; bonus points go to anyone who's ever written their own Snort rules, especially if the rules have been published as part of any open-source project. We need someone who can look at packets in Wireshark, understand protocols like HTTP, FTP, SMTP, etc., and has the troubleshooting skills to figure out whether a given IDS alert is the real deal, or just a false positive. By the time you leave, you will have fixed bugs in dozens of public Snort rules, and learned how to work with a professional, 24/7 support organization. Guidance will be provided along the way. You'll essentially be Tier II support, but with cool folks above you that will explain the nature of what you're looking at when you escalate further up the chain.
Successful interns will be invited back for future work, either as an intern while still in school, or potentially full-time upon graduation.
This is a paid internship; compensation will be discussed upon selection of the appropriate candidate.
DOCUMENTATION INTERN (position 925335)
If you are the kind of person described below, we want you as our next intern.
Can explain technical things to your grandmother, and break down a complex scientific concept to a Luddite.
Writing in English comes as naturally to you as writing in code.
You enjoy the moment when the person you're teaching says "Aha! Now I get it!".
Sourcefire has the perfect internship for you! We need you to help us with end-user communications.
Some of it will be pretty straightforward stuff - we need documentation written for rules that don't conform to a standard, vulnerability-based template (think new exploit kits or malicious JavaScript indicators).
Other parts will be more entertaining - we've done "Vulnerability Report" videos in the past, but they're a huge hassle to put together, especially when you're busy fighting real-world threats. Depending on how fast you learn, we may get you to put up a blog post or two for our audience of tens of thousands of security professionals across the globe. Bonus points if you're good with social media.
In exchange for your talents, we'll teach you everything you can absorb about network intrusion detection, Snort rules writing, web-based malware, and other related topics.
Successful interns will be invited back for future work, either as an intern while still in school, or potentially
full-time upon graduation.
This is a paid internship; compensation will be discussed upon selection of the appropriate candidate.
If you have not met with The Shriver Center to get your resume reviewed for use on UMBCworks, click HERE
SUPPORT ASSISTANCE INTERN (position 9253352)
Want to help improve the quality of detection against live threats in the field for millions of users across the planet? Sourcefire has an internship for you!
We need a Snorthead who can help us manage the queue of rules-related issues that pop up from our support organization.
The successful applicant will already be familiar with Snort as an IDS; bonus points go to anyone who's ever written their own Snort rules, especially if the rules have been published as part of any open-source project. We need someone who can look at packets in Wireshark, understand protocols like HTTP, FTP, SMTP, etc., and has the troubleshooting skills to figure out whether a given IDS alert is the real deal, or just a false positive. By the time you leave, you will have fixed bugs in dozens of public Snort rules, and learned how to work with a professional, 24/7 support organization. Guidance will be provided along the way. You'll essentially be Tier II support, but with cool folks above you that will explain the nature of what you're looking at when you escalate further up the chain.
Successful interns will be invited back for future work, either as an intern while still in school, or potentially full-time upon graduation.
This is a paid internship; compensation will be discussed upon selection of the appropriate candidate.
DOCUMENTATION INTERN (position 925335)
If you are the kind of person described below, we want you as our next intern.
Can explain technical things to your grandmother, and break down a complex scientific concept to a Luddite.
Writing in English comes as naturally to you as writing in code.
You enjoy the moment when the person you're teaching says "Aha! Now I get it!".
Sourcefire has the perfect internship for you! We need you to help us with end-user communications.
Some of it will be pretty straightforward stuff - we need documentation written for rules that don't conform to a standard, vulnerability-based template (think new exploit kits or malicious JavaScript indicators).
Other parts will be more entertaining - we've done "Vulnerability Report" videos in the past, but they're a huge hassle to put together, especially when you're busy fighting real-world threats. Depending on how fast you learn, we may get you to put up a blog post or two for our audience of tens of thousands of security professionals across the globe. Bonus points if you're good with social media.
In exchange for your talents, we'll teach you everything you can absorb about network intrusion detection, Snort rules writing, web-based malware, and other related topics.
Successful interns will be invited back for future work, either as an intern while still in school, or potentially
full-time upon graduation.
This is a paid internship; compensation will be discussed upon selection of the appropriate candidate.
Posted: August 27, 2012, 12:56 AM