{"id":351,"date":"2025-08-05T01:30:22","date_gmt":"2025-08-05T01:30:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nicholascarter\/?page_id=351"},"modified":"2025-08-05T01:30:22","modified_gmt":"2025-08-05T01:30:22","slug":"reflection-paper-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nicholascarter\/reflection-paper-1\/","title":{"rendered":"Reflection Paper 1"},"content":{"rendered":"\n<p>Working as an intern at GFT as a Cybersecurity Analyst for my first 50 hours has given<br>me exposure to the company\u2019s procedures and history, experience in meeting and<br>effectively communicating with others in a professional environment, and reading and<br>writing reports to effectively provide proper cybersecurity protocols and<br>recommendations for companies.<br>GFT has a rich company history and extensive procedures that they require all<br>employees to follow. In my first 50 hours, my supervisor took the time to go over GFT<br>and what services they provide and how they make an impact for other companies in<br>various fields like engineering and cybersecurity. I also got to attend multiple orientation<br>meetings where I got taught about what the company will expect for me as an intern,<br>and best practices to follow to be successful in my time with GFT. Some of these<br>practices include consistent communication, being proactive with tasks, and staying<br>curious to learn as much as possible with the time I have working as an intern.<br>Communication is a huge part of keeping efficiency at GFT. Since GFT works mostly<br>remote, communication isn\u2019t always as easy as it typically would be working in person at<br>an office. Thankfully, they taught us the best practices when sending emails and how to make the most of the times you get in meetings by note taking and using AI to make<br>meeting summaries that can be viewed later.<br>The most valuable part of my first 50 hours was being able to implement cybersecurity<br>policies and practices that I have learned into a real world setting with the guidance of<br>experienced experts around me. I was able to sit in on meetings where GFT would<br>evaluate various companies current cybersecurity practices and I was responsible for<br>recording the meetings main points with note taking. After the meetings I would go to<br>the AI note taker and collaborate the notes together to form a summary that would be<br>edited and delivered to the client. We then would use these notes of practices such as<br>what their current response plan is, who has access to what data and hardware, what<br>ports are open on their network, and how sensitive information is stored and sent. Then<br>I was able to collaborate with others to use guidelines from large cybersecurity<br>organizations like NIST and CISA to outline ways to correct practices that may be<br>leaving them vulnerable, and a plan to implement it in a practical cost effective way.<br>Being able to collaborate and see the knowledge of other analysts who have even<br>worked for government agencies responsible for establishing these rules helped me<br>learn from and make relationships with them. Then I also had the privilege to meet the<br>the safety and security director for GFT. He told me about his experience in<br>cybersecurity and what information and characteristics has helped him progress in his<br>professional career.<br>Overall, the first 50 hours I have worked with GFT have been insightful and already<br>incredibly beneficial in my growth as a cybersecurity professional. While it was a little bit<br>intimidating at first, once I got the chance to interact with the company procedures and others it did not seem as bad. In the upcoming weeks I will be taking trips where I will be<br>able to walk around SCADA systems for analysis, and interview workers there go gather<br>information on their current processes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Working as an intern at GFT as a Cybersecurity Analyst for my first 50 hours has givenme exposure to the company\u2019s procedures and history, experience in meeting andeffectively communicating with others in a professional environment, and reading andwriting reports to effectively provide proper cybersecurity protocols andrecommendations for companies.GFT has a rich company history and extensive&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nicholascarter\/reflection-paper-1\/\">Read More<\/a><\/div>\n","protected":false},"author":29694,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/351"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/users\/29694"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/351\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/pages\/351\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nicholascarter\/wp-json\/wp\/v2\/media?parent=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}