Cybersecurity Internship

This course allows students to volunteer to work in an agency related to cybersecurity. Students must volunteer for 50 hours per course credit and complete course assignments.

Reflective papers

Reflective Paper 1 – 50 Hours of Internship

In my first 50 hours at 5th Harmoney, LLC, as a Jr. Cyber Security Engineer, I have been actively involved in identifying vulnerabilities and contributing to data protection strategies. One of my key tasks was remotely scanning a client’s database for security flaws. I utilized various vulnerability scanning tools, and the remote setup required clear communication and detailed reports to ensure effective collaboration.

Working on data protection strategies also provided valuable insight into privacy regulations, particularly GDPR. Although I collaborated through digital platforms like Zoom, I feel like I need a little more experience before I’m able to contribute fully. Even so, these tasks enhanced my understanding of real-world security protocols, even from a remote work environment.

Progress Toward Learning Objectives:

  • Vulnerability Identification: I’ve significantly improved in recognizing security gaps through remote tools.
  • Data Protection: I gained experience aligning security policies with regulatory frameworks.

One challenge I faced was feeling isolated at times while working remotely, especially when encountering technical issues. Without immediate physical access to colleagues, I had to rely heavily on written communication and virtual meetings to resolve problems. For instance, during the vulnerability assessment project, I encountered difficulties with one of the scanning tools. After troubleshooting on my own, I reached out to my supervisor and teammates for support through our messaging platform. Through their guidance and further online research, I was able to resolve the issue and complete the task.

Overall, working remotely has required self-discipline and strong communication, both of which have improved over time. I feel more confident in my ability to work independently and manage tasks without immediate oversight, which has been a key learning outcome. Although I still have a lot to learn, I feel my first 50 hours were both constructive and impactful. I look forward to the remainder of this internship.

Reflective Paper 2  – 50 Hours of Internship

During this phase of my remote internship at 5th Harmoney, LLC, as a Jr. Cyber Security Engineer, I continued to build on my knowledge of network security and incident response. Working remotely, I’ve had to rely on self-guided research, virtual tools, and online resources to complete my tasks and progress toward my learning objectives.

One key project I worked on involved configuring a firewall and setting up an Intrusion Detection System (IDS). Since my role is fully remote, I used TryHackMe, an interactive online platform for cybersecurity training, to simulate real-world network environments. Configuring the firewall required careful balancing to ensure the system blocked unauthorized access without interfering with legitimate traffic. Through this experience, I gained a deeper understanding of network traffic patterns and the importance of tuning security settings to maintain system performance. Monitoring network traffic through the IDS also reinforced how vital proactive detection is for preventing cyberattacks.

In addition to network security, I contributed to updating the company’s incident response plan. This involved reviewing existing protocols and making suggestions to improve the efficiency of the response process. Although I didn’t work directly with a team in real time, I had to ensure my revisions were well-documented and clear for future review by my supervisor. This task gave me a broader understanding of how structured planning is essential in addressing cybersecurity threats.

Progress Toward Learning Objectives

  • Vulnerability Identification: Although my focus was primarily on network security, I gained a better understanding of how vulnerabilities can manifest through network traffic. This experience reinforced my ability to detect weaknesses in real-time scenarios.
  • Network Security: I made significant progress in configuring and managing network security tools like firewalls and IDS. Using TryHackMe gave me hands-on experience in applying theoretical knowledge to practical cybersecurity tasks.
  • Incident Response: Working on the incident response plan deepened my understanding of how to prepare for and mitigate cybersecurity incidents. The revisions I made helped strengthen the response framework, ensuring a more streamlined approach to addressing breaches.

Challenges and Problem-SolvingA major challenge of working remotely has been resolving technical issues on my own. For instance, while configuring the IDS, I encountered several unexpected errors. Without immediate access to colleagues for assistance, I had to troubleshoot the problem independently. This required extensive research and testing before finding the solution, which ultimately helped me become more resourceful and confident in my problem-solving abilities. I also made sure to document each step of the process, so if similar issues arise in the future, I’ll have a clear record to refer back to.

Another challenge has been maintaining focus and discipline without the structure of an office environment. Since my work is done entirely from home, I’ve had to create a clear schedule and ensure I stick to it to meet deadlines. This has required a high level of organization and personal accountability, which has improved my time-management skills.

Observations and FeelingsWorking independently in a remote role has its unique challenges, but I’ve found it to be a valuable learning experience. Without immediate oversight, I’ve had to rely on my initiative to solve problems, making me more self-sufficient. I’ve also learned to communicate my progress effectively through written updates and reports, which is critical in a remote work environment.

In terms of technical growth, I feel much more confident in my ability to configure network security systems and respond to potential threats. While remote work can feel isolating at times, it has also given me the flexibility to work at my own pace and develop my skills in a focused, independent setting.

ConclusionOver the last 50 hours, I’ve made substantial progress in network security and incident response planning, despite the challenges of working remotely. The hands-on experience with firewall configuration and IDS setup has been invaluable, and the independent nature of my work has pushed me to develop stronger problem-solving and self-management skills. I’m excited to continue building on these foundations in the next phase of my internship and further explore the cybersecurity field.

Reflective Paper 3 – 50 Hours of Internship

In this recent 50-hour segment of my remote internship at 5th Harmoney, LLC, I concentrated on expanding my expertise in vulnerability identification and enhancing my understanding of data protection strategies. As a Jr. Cyber Security Engineer, my role required me to assess system vulnerabilities and ensure that sensitive data was adequately protected in line with cybersecurity standards and regulatory requirements.

A significant portion of my time was dedicated to conducting vulnerability scans using Nessus, a widely used vulnerability assessment tool. Running these scans allowed me to identify potential weaknesses in the network infrastructure. After each scan, I analyzed the reports, prioritized vulnerabilities based on severity, and proposed recommendations to mitigate the identified risks. This hands-on experience with Nessus was highly beneficial, as it gave me a clearer picture of real-world security flaws and how they can be exploited. By learning to interpret the results and categorize vulnerabilities, I enhanced my analytical skills and gained deeper insight into the process of protecting systems against cyber threats.

Another task I worked on involved reviewing and updating the company’s data protection policies. I researched compliance requirements for data privacy, particularly in relation to the General Data Protection Regulation (GDPR) and other relevant laws. This research helped me understand how critical it is to develop policies that balance security needs with legal obligations. By suggesting improvements to the company’s data handling practices, I contributed to ensuring the protection of sensitive customer data.

Progress Toward Learning Objectives

  • Vulnerability Identification: My ability to identify and assess security vulnerabilities improved greatly during this period. The use of Nessus gave me direct experience in spotting system weaknesses and prioritizing them for remediation.
  • Data Protection Strategies: I gained valuable insight into regulatory compliance and how it informs the development of effective data protection policies. This has deepened my understanding of how to protect sensitive data while adhering to legal standards.

Challenges and Problem-SolvingOne of the challenges I faced during this period was troubleshooting errors that occurred during vulnerability scans. Some issues arose due to connectivity problems, which affected the accuracy of the scan results. Without immediate access to a support team, I had to rely on online forums and technical documentation to resolve the issues independently. While this process was time-consuming, it ultimately improved my troubleshooting skills and increased my confidence in solving technical problems remotely.

Another challenge involved interpreting complex data protection regulations. Since the legal language can be difficult to understand, I spent additional time breaking down the requirements into actionable steps that the company could implement. This experience taught me how to translate regulatory language into clear and practical guidelines, a skill that will be essential in future cybersecurity roles.

Observations and FeelingsWorking remotely continues to require a high level of self-discipline and motivation. I’ve found that having a clear, structured plan for each task helps me stay focused and ensures that I meet deadlines. The independence of remote work has also pushed me to develop a more proactive approach to learning. When faced with challenges, I’ve learned to conduct thorough research and take the initiative to solve problems without waiting for assistance.

The most rewarding aspect of this period was seeing the tangible results of my work, particularly when analyzing vulnerability reports and implementing improved data protection policies. These tasks have given me a greater sense of responsibility in safeguarding the company’s systems and data. I feel more confident in my technical abilities and in my understanding of the broader implications of cybersecurity work, especially in terms of legal compliance.

ConclusionThese 50 hours have been instrumental in improving my vulnerability assessment skills and expanding my knowledge of data protection strategies. Working with tools like Nessus has provided me with practical experience that I can apply to future cybersecurity tasks. The challenges I’ve encountered have also helped me become more resourceful, particularly when solving problems independently in a remote work environment. Moving forward, I’m eager to continue applying these skills and deepening my expertise in cybersecurity.

Reflective Paper 4 – 50 Hours of Internship

In this recent 50-hour segment of my remote internship with 5th Harmoney, LLC, I continued to build on the cybersecurity skills I developed in earlier tasks, especially in network security and incident response. Working from home as a Jr. Cyber Security Engineer, I’ve been focusing on refining methods I learned before, applying them to new projects, and becoming more comfortable with handling similar responsibilities on my own.

One of my main tasks involved improving the setup and security of the company’s virtual private network (VPN), which helps protect remote access to their systems. This was similar to the firewall and IDS work I did previously, but now I was focused on configuring the VPN’s settings and testing its security across different devices. I learned how encryption and secure login measures help keep unauthorized users out, which is critical for remote access security. Revisiting these concepts reinforced my understanding and made me more confident in managing secure network tools remotely.

Additionally, I worked on updating an incident response checklist that we had started earlier. This checklist is meant to guide us if a security breach occurs, outlining each step we need to take to respond quickly and efficiently. I added more details to the document to make sure it’s clear and easy to follow, including examples from recent security case studies I read about. Continuing this work helped me see the importance of having a well-prepared plan to address potential threats.

Progress Toward Learning Objectives

  • Network Security: By revisiting and expanding on VPN setup and testing, I gained additional experience with configuring secure access. This reinforced my earlier work on firewalls and gave me more confidence in remote network management.
  • Incident Response: Updating the incident response checklist allowed me to build on my previous understanding of handling cybersecurity threats. I’m more prepared now to follow a clear plan if a security event happens.

Challenges and Problem-SolvingOne of the main challenges during this period was troubleshooting VPN settings to work well across different devices. Without on-site access, I had to try different adjustments remotely, which required a lot of patience and testing. Finding solutions independently made me feel more self-reliant and capable of solving technical issues from a distance.

Another challenge was making sure the incident response checklist was thorough but still easy to understand. I spent extra time researching best practices and applying feedback from previous tasks to make the checklist as practical as possible.

Observations and FeelingsWorking remotely continues to teach me to stay organized and disciplined. Each time I revisit similar tasks, I feel more confident in my skills and find it easier to manage my time. Improving the VPN setup and refining the incident response checklist gave me a sense of accomplishment, knowing my work plays a role in keeping the company’s data safe.

ConclusionThe last 50 hours allowed me to revisit and strengthen skills I’ve been developing throughout my internship, like network security and incident response planning. Applying what I’ve learned to similar tasks has boosted my confidence, and I think I’m ready to take on even more complex responsibilities when given the opportunity.

Reflective Paper 5 – 50 Hours of Internship

In this recent segment of my internship with 5th Harmoney, LLC, I continued to build on the cybersecurity practices I’ve been developing throughout my role as a Jr. Cyber Security Engineer. Working remotely, I’ve refined my skills in identifying vulnerabilities and enhancing network security while focusing on improving my efficiency and adaptability in a virtual work environment.

One of my primary tasks involved conducting another series of vulnerability scans using Nessus, a tool I’ve been working with in previous assignments. This time, I focused on refining my analysis by delving deeper into false positives and distinguishing them from actual threats. While this task felt familiar, I noticed that my process has become more streamlined, and I can now interpret scan results more quickly and accurately. Reviewing these findings and suggesting remediation steps has become second nature, and it’s rewarding to see how far I’ve come in understanding vulnerability management.

In addition to vulnerability scans, I revisited the company’s incident response checklist, focusing on updating it with recent insights gained from online simulations. These simulations mimicked real-world security breaches, such as phishing attacks and ransomware scenarios. Building on what I’ve learned, I incorporated additional response steps for early threat detection and secure data recovery. This iterative work reinforced the importance of continuous improvement in cybersecurity planning.

Progress Toward Learning Objectives

  • Vulnerability Identification: By continuing to use Nessus, I’ve improved my technical understanding of vulnerabilities and my ability to prioritize and communicate effective mitigation strategies.
  • Incident Response: Updating the incident response checklist allowed me to apply new knowledge gained from simulations, making the plan more comprehensive and adaptable to real-world scenarios.

Challenges and Problem-Solving

One challenge during this period was managing the volume of data from vulnerability scans. Filtering through numerous entries and verifying the validity of flagged items required patience and attention to detail. I used online resources and documentation to help cross-check findings, which streamlined the process.

Another challenge was staying disciplined while working remotely. Without immediate feedback from colleagues, I had to rely on my judgment and proactively check my work. This experience has pushed me to trust my skills more and sharpen my self-review processes.

Observations and Feelings

I’ve noticed that tasks that once felt overwhelming are becoming more manageable, thanks to repetition and growing confidence. While working remotely can feel isolating to some, the independence it demands has been a valuable learning experience for me. It’s satisfying to see how the work I’m doing—whether it’s improving incident response plans or identifying vulnerabilities—contributes directly to the company’s cybersecurity efforts.

Conclusion

These past 50 hours have been about consistency and growth. Revisiting tools and tasks I’ve used before, like Nessus and the incident response checklist, has allowed me to solidify my skills while refining my approach. I feel increasingly prepared to handle more complex responsibilities as I move forward in this internship.

Reflective Paper 6 – 50 Hours of Internship

Why I Chose to Interview This Professional

For this assignment, I interviewed my internship supervisor, Phillips Humphrey, the owner of 5th Harmoney LLC, who has extensive experience in cybersecurity. I chose him because he has a wealth of practical knowledge in the field and has guided me throughout my internship. His insights into the industry, combined with his direct involvement in managing cybersecurity projects, made him an ideal candidate for understanding what it takes to succeed in this field.

Interview Insights

  1. What would be the most important knowledge, skills, and abilities needed by someone in this field?Phillips emphasized the importance of technical skills, particularly in network security, system vulnerability assessment, and incident response. He also highlighted the need for strong analytical skills and the ability to think critically under pressure. “Cybersecurity is about solving problems, sometimes on the spot, so being able to quickly assess a situation and act decisively is essential,” he said.

Soft skills, such as communication and teamwork, are equally important. He pointed out that cybersecurity professionals often collaborate with other departments and need to explain technical concepts to non-technical stakeholders.

  1. What would good entry-level jobs be for gaining experience to become a cybersecurity engineer? According to Phillips, entry-level roles such as Security Operations Center (SOC) Analyst, IT Support Specialist, or Junior Network Administrator are great starting points. These roles provide hands-on experience with monitoring systems, troubleshooting security incidents, and understanding the foundational aspects of cybersecurity. He mentioned that internships, like the one I’m currently completing, are also invaluable for gaining real-world exposure.
  2. What advice would you give to someone starting in this field?Phillips stressed the importance of continuous learning. “Technology evolves quickly, so staying updated on the latest tools and threats is critical,” he advised. He also recommended pursuing certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), and eventually Certified Information Systems Security Professional (CISSP) to build credibility and expertise.

Reflection on the Interview

This interview gave me a clear perspective on what it takes to succeed as a cybersecurity professional. Hearing Phillips talk about the balance between technical and soft skills resonated with me, as I’ve noticed similar challenges during my internship. His emphasis on continuous learning has motivated me to explore certifications and training programs after graduation.

Overall, this conversation reinforced the value of my internship experience and helped me better understand the skills and career paths that will help me achieve my goals in the cybersecurity field.

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab