Logo of Huzzle


Global Information Security Intern

Logo of Model N

Model N


1mo ago

🚀 Off-cycle Internship
đź’» Remote

AI generated summary

  • You must possess technical skills, cybersecurity knowledge, analytical abilities, and communication skills. Willingness to learn, adapt to new technologies, and maintain ethical conduct are key.
  • You will be conducting vulnerability assessments, incident response planning, security awareness training, policy review, and security tool evaluation on a daily basis to enhance information security at Model N.

Off-cycle Internship

IT & Cybersecurity


  • Model N is looking for college students (who have completed their junior year) ready to jump start their career exposure with an internship. We offer unparalleled hands-on experience working in an exciting yet challenging industry. Consider this an early career start, where you will have the opportunity to work alongside and be mentored by some of the brightest minds at Model N. 
  • You will have the opportunity to get to know the other Model N interns and participate in workshops and trainings designed just for you and your peers. In addition, each week there will be time for additional learning through LinkedIn Learning on topics to help you develop your skills and business acumen.  
  • The Global Information Security Intern will be primarily focused on enhancing the Model N security posture and ensuring the confidentiality, integrity, and availability of its data and systems. The objective of the project is to strengthen the organization's defense against cyber threats, mitigate risks, and improve overall security resilience. The work done in this internship will contribute toward building a culture of security and positioning Mode N as a leader in cybersecurity practices.


  • To be successful candidates should possess a combination of technical skills, knowledge, and personal attributes.
  • A strong foundation in technical skills, cybersecurity knowledge, analytical abilities, and effective communication and collaboration skills.
  • Demonstrate a willingness to learn
  • Adaptability to new technologies and methodologies
  • Commitment to ethical conduct in handling sensitive information and security incidents.

Education requirements

Currently Studying

Area of Responsibilities

IT & Cybersecurity


  • Vulnerability Assessment and Management: Conducting regular scans and assessments to identify vulnerabilities in the organization's network, systems, and applications. This involves using various tools and techniques to identify potential weaknesses that could be exploited by attackers.
  • Incident Response Planning: Assisting in the development and documentation of incident response plans and procedures. This includes defining roles and responsibilities, establishing communication protocols, and outlining steps to be taken in the event of a security incident.
  • Security Awareness Training: Collaborating with the security team to develop and deliver security awareness training programs for employees. This aims to educate staff about common security threats, best practices for safeguarding data, and how to recognize and report suspicious activities.
  • Policy and Compliance Review: Assisting in reviewing and updating information security policies, standards, and procedures to ensure compliance with relevant regulations and industry standards (such as GDPR, HIPAA, PCI DSS, etc.). This involves conducting gap analyses, identifying areas for improvement, and recommending changes as needed.
  • Security Tool Evaluation and Implementation: Participating in the evaluation and selection of security tools and technologies to enhance the organization's security posture. This could include researching new solutions, testing software products, and assisting in the deployment and configuration of security controls.
  • Security Incident Analysis: Assisting in the analysis of security incidents and breaches to determine their root causes, extent of impact, and lessons learned. This involves collecting and analyzing forensic evidence, collaborating with other teams (such as IT, legal, and compliance), and making recommendations to prevent future incidents.


Work type

Full time

Work mode