Logo of Huzzle

Global Information Security Intern

image

Model N

Mar 21

Applications are closed

  • Internship
    Full-time
    Off-cycle Internship
  • IT & Cybersecurity

Requirements

  • To be successful candidates should possess a combination of technical skills, knowledge, and personal attributes.
  • A strong foundation in technical skills, cybersecurity knowledge, analytical abilities, and effective communication and collaboration skills.
  • Demonstrate a willingness to learn
  • Adaptability to new technologies and methodologies
  • Commitment to ethical conduct in handling sensitive information and security incidents.

Responsibilities

  • Vulnerability Assessment and Management: Conducting regular scans and assessments to identify vulnerabilities in the organization's network, systems, and applications. This involves using various tools and techniques to identify potential weaknesses that could be exploited by attackers.
  • Incident Response Planning: Assisting in the development and documentation of incident response plans and procedures. This includes defining roles and responsibilities, establishing communication protocols, and outlining steps to be taken in the event of a security incident.
  • Security Awareness Training: Collaborating with the security team to develop and deliver security awareness training programs for employees. This aims to educate staff about common security threats, best practices for safeguarding data, and how to recognize and report suspicious activities.
  • Policy and Compliance Review: Assisting in reviewing and updating information security policies, standards, and procedures to ensure compliance with relevant regulations and industry standards (such as GDPR, HIPAA, PCI DSS, etc.). This involves conducting gap analyses, identifying areas for improvement, and recommending changes as needed.
  • Security Tool Evaluation and Implementation: Participating in the evaluation and selection of security tools and technologies to enhance the organization's security posture. This could include researching new solutions, testing software products, and assisting in the deployment and configuration of security controls.
  • Security Incident Analysis: Assisting in the analysis of security incidents and breaches to determine their root causes, extent of impact, and lessons learned. This involves collecting and analyzing forensic evidence, collaborating with other teams (such as IT, legal, and compliance), and making recommendations to prevent future incidents.

Model N enables our life sciences and high-tech customers to deliver life-changing products to the world.

Technology
Industry
501-1000
Employees
1999
Founded Year

Mission & Purpose

Model N is the leader in revenue optimization and compliance for pharmaceutical, medtech and high-tech innovators. Our intelligent platform powers your digital transformation with integrated technology, data, analytics, and expert services that deliver deep insight and control. Our integrated cloud solution is proven to automate pricing, incentive and contract decisions to scale business profitably and grow revenue. Model N is trusted across more than 120 countries by the world’s leading pharmaceutical, medical technology, semiconductor, and high-tech companies, including Johnson & Johnson, AstraZeneca, Stryker, Seagate Technology, Broadcom, and Microchip Technology.