CYSE 368 Reflection Paper #1
Shauntell Gavino-Collins
Reflection Paper #1
09/08/25
Cavalier Logistics
ODU Fall 2025
Professor Teresa Duvall
Internship Reflection Paper 1
First 2 Weeks/50 hours
Working as a Network Security Intern for Cavalier Logistics for my first 50 hours has given me the opportunity to apply what I have learned so far from ODU and get hands-on experience and professional exposure involving cybersecurity. This is my first internship, and it has been quite interesting with how I am applying what I have learned and seeing how cybersecurity is integral to supporting a global logistics organization. Cavalier Logistics (the headquarters and where my internship is in Sterling, Virginia) specializes in forwarding freight, supply chain solutions, and my role contributes to strengthening and maintaining the security of its IT infrastructure.
During orientation, I was introduced to the company’s background, its network environment, and the expectations for my position. My supervisor, Stacey Collins, explained early on that I would not be expected to become an expert right away. Due to this internship being compact (6 weeks) running from August 25th, 2025, through October 1st, 2025, it has been structured in three phases (this is from my supervisor):
- The first 50 hours are focused on research and becoming comfortable with the systems.
- The next 50 hours will involve shadowing Mr. Collins directly to see how network security tasks are handled in real time.
- The final 50 hours will give me the chance to execute tasks independently, while still running everything by Mr. Collins for review and approval before submission.
So far, much of my internship has revolved around researching the tools and systems that Cavalier Logistics relies on. For example, I have been learning about the Cisco Meraki MR-56 access points, which allows the company to manage all their wireless devices from the cloud (this is across seven states). I have also studied the Cisco FPR1010-NFGW-K9 firewalls, which are Next Generation Firewalls (NGFWs), and these provide secure connections using encryption which protects the sensitive information as it moves between locations.
These tools connect directly to my first learning objective of designing, optimizing, implementing, and maintaining Cisco Network Systems. While I am still in the research stage, I am beginning to understand how Cisco Meraki and Cisco NGFWs form the backbone of Cavalier Logistics. Similarly, my second objective of working with routers, switches, firewalls, and VeloCloud devices is to be addressed through exposure to the company’s infrastructure, but I am gaining the knowledge behind them. My third learning objective is helping mitigate security breaches, and I have not started that yet, just researching the best practices to mitigate and what they have done in the past. My fourth learning objective is working with cloud datacenters, and I have learned that having a centralized cloud-based management reduces difficulties across the seven states and their locations whilst continuing in providing careful oversight to prevent vulnerabilities.
Conclusion
In conclusion, the first 50 hours of my internship have been informative, motivating, and to be quite honest, humbling. Since this initial phase was designed around research and learning, it gave me the chance to become familiar with Cavalier Logistics systems and tools without the pressure of performing tasks right away. I studied Cisco Meraki MR-56 access points and Cisco FPR1010-NFGW-K9 firewalls, and in doing so, I began to understand how they support and secure multi-state operations. While I am still learning their functions, this research has strengthened my appreciation for how cybersecurity protects the company’s ability to communicate and operate effectively.
This phased approach that Mr. Collins created is extremely helpful because it allows me to understand the systems and tools which have made me more comfortable, assisted in building my confidence, and allowed me to build a foundation of knowledge before throwing me in to more hands-on and more responsible duties. Mr. Collins made it clear from the start that I would not be expected to be an expert right away, and that reassurance has encouraged me to ask questions and take time absorbing the information. I also appreciated the flexibility he gave me with scheduling, which made it easier to balance my internship with my other college classes while working in an accelerated manner for the 150 hours of my internship. This first stage of the phase has provided the groundwork I need to move into the shadowing phase, where I will begin connecting my research with real world applications.
CYSE 368 Reflection Paper #2
Shauntell Gavino-Collins
Reflection Paper #2
09/22/25
Cavalier Logistics
ODU Fall 2025
Professor Teresa Duvall
Internship Reflection Paper 2
Second 2 Weeks/50 hours
The second 50 hours of my internship at Cavalier Logistics marked the shadowing stage, where I shadowed my supervisor Mr. Collins directly in his role as a network engineer. This stage has been incredibly educational because it gave me the chance to see a professional in cybersecurity operate fluidly and actively saw the networking practices applied in front of me.
By shadowing Mr. Collins, I learned a broad range of responsibilities required in managing and securing an enterprise network. He configures router access-lists to allow VoIP phones to connect to web servers for dial tone while also ensuring that computers have access across different VLANs for web-based integrated applications. I watched how he orchestrated ISP circuit installations, managed service outages, and directed the restoration of Internet services when interruptions occurred. Mr. Collins also configures and manages firewalls, switches, routers, and wireless access points.
This shadowing experience also gave me a clear view of the importance of the level of detail required in this career field. I saw how even small mistakes in router configurations or firewall rules could create vulnerabilities. Mr. Collins encouraged me to ask questions and take thorough notes, reminding me that understanding the “why” behind each decision is just as important as memorizing technical steps. Another important aspect of this phase has been understanding teamwork and communication. I observed how Mr. Collins coordinated with other departments to align technical needs with business requirements, such as watching him explain technical issues to non-technical coworkers.
As with the first phase, I appreciated the flexibility in scheduling. While maintaining a minimum of 20 hours per week, he allowed me to adjust my hours when needed to balance academic responsibilities. This flexibility has kept me on track for completing the 150-hour requirement whilst also making sure I could fully commit to observing and learning during this stage.
Conclusion
The second stage of the phase in my internship has significantly advanced my understanding of enterprise-level cybersecurity and networking. Shadowing Mr. Collins gave me a firsthand look at how routers, firewalls, and switches are configured and maintained to keep a global logistics company secure and operational. This phased approach has proven to be extremely effective because it allows me to build confidence gradually for each stage. Researching in the first stage of the phase gave me the technical/knowledgeable foundation, on top of my learning at ODU, and shadowing in this second stage of the phase showed me how those concepts are applied in an actual job. I now feel more prepared to enter the final stage of my internship, where I will begin executing tasks under Mr. Collins’ guidance and apply what I have learned in both research and observation.
CYSE 368 Reflection Paper #3
Shauntell Gavino-Collins
Reflection Paper #3
09/30/25
Cavalier Logistics
ODU Fall 2025
Professor Teresa Duvall
Internship Reflection Paper 3
Third 2 Weeks/50 hours
The final 50 hours of my internship at Cavalier Logistics represented the execution stage, where I transitioned from observing to taking on tasks myself under the oversight of Mr. Collins. This was the most challenging and rewarding part of my internship because it required me to apply what I had researched during the first 50 hours and what I had observed during the second 50 hours during the shadowing stage.
One of my first assignments in this phase is directly connected to my first learning objective: designing, optimizing, implementing, and maintaining Cisco Network Systems. Under Mr. Collins’ guidance, I assisted in configuring router access lists that allowed VoIP phones to securely connect to web servers for dial tone, while ensuring computers operated on separate VLANs for web-based integrated applications. This demonstrated how careful planning and precision in configuration directly supports both functionality and security.
My second objective, working with routers, switches, firewalls, and VeloCloud devices, came into play as I managed Cisco Meraki MR-56 access points and worked with Cisco FPR1010-NFGW-K9 firewalls. I helped segment staff and guest networks through Meraki’s cloud management system and assisted in maintaining secure site-to-site encrypted connections between Cavalier Logistics’ branches across seven states. I also began to understand how VeloCloud devices are used to simplify WAN management, though my role here was limited to assisting with documentation and monitoring.
The third objective, helping mitigate security breaches, was emphasized as I learned to review firewall rules, verify encryption settings, and document ISP circuit installation and outage recovery steps. By supporting Mr. Collins in monitoring logs and identifying potential vulnerabilities, I realized how small oversights could expose the company to significant risks.
Finally, I gained exposure to my fourth objective, working with cloud datacenters. Through the Meraki dashboard, I observed how Cavalier Logistics centrally manages wireless access points and firewall policies across multiple states. I assisted in documenting best practices for using cloud-based monitoring tools, which reduce complexity while maintaining visibility and control over the entire network infrastructure.
Conclusion
This final stage of my internship brought everything together: the research from the 1st stage, the shadowing from the 2nd stage, and the execution from the 3rd stage. This phased approach was invaluable because it gave me the time to build a foundation, observe best practices, and finally put my learning into action with guidance. By the end of this phase, I not only gained confidence in configuring network devices and working with enterprise security tools, but I also developed a deeper appreciation for the precision, communication, and teamwork required in cybersecurity.
Mr. Collins’ mentorship has been truly a cornerstone of my growth. His willingness to let me learn at my own pace, while still holding me accountable for accuracy, made this experience both challenging and encouraging. I am leaving this internship with a stronger technical foundation, real-life hands on skills, and the confidence to take on future cybersecurity roles. Most importantly, I have learned how to approach problems systemically and responsibly that will ultimately carry with me throughout my academic journey at ODU and into my professional career.
CYSE 368 Internship Final Paper
Shauntell Gavino-Collins
Cavalier Logistics
Mr. Collins, Network Consultant
CYSE 368 Internship Fall 2025
December 01, 2025
CYSE 368 Internship Final Paper
6 weeks/150 hours
CYSE 368 Internship Final Paper
Shauntell Gavino-Collins
Cavalier Logistics
Mr. Collins, Network Consultant
CYSE 368 Internship Fall 2025
December 01, 2025
Table of Contents
- Introduction
- Management Environment
- Work Duties & Assignments
- Use of Cybersecurity Skills & Knowledge
- ODU Curriculum Connection
- Learning Outcomes Reflection
- Motivating Aspects
- Discouraging Aspects
- Challenging Aspects
- Recommendations for Future Interns
- Conclusion
- Introduction
When I started looking for internships, Cavalier Logistics stood out because they had an incredible flexible schedule and let interns work on real network security issues instead of simply shadowing people all day. The company is based in Sterling, Virginia, and they handle transportation and supply chain management, air freight, ocean freight, warehousing, and distribution. With offices across multiple states, they rely heavily on their network infrastructure to keep everything running smoothly between locations. I wanted a hands-on experience in a real business environment, and this seemed like the perfect opportunity.
Cavalier Logistics operates in a highly competitive industry where timing is everything. A delayed shipment or compromised client data could mean losing contracts worth millions of dollars. This reality made the cybersecurity work feel urgent and meaningful from day one. Understanding the stakes helped me appreciate why every firewall rule and access control decision mattered so much.
My long-term goal is to work in forensic accounting and cybercrime prevention, so I wanted to understand how companies protect their digital infrastructure and sensitive client data. This internship let me see both the technical side of cybersecurity and how it fits into actual business operations in the logistics industry. The logistics sector faces unique cybersecurity challenges that I hadn’t fully appreciated before. Unlike financial institutions or healthcare providers, or other industries, logistics companies must maintain security while coordinating with countless external partners, freight carriers, customs brokers, warehouse operators, and international shipping lines. Each external connection represents a potential vulnerability, which meant I got to see how security professionals balance openness for business efficiency with protection against threats.
Before starting, I set three main goals. First, I wanted to get comfortable working with enterprise-level networking equipment and cloud-based management platforms, specifically Cisco Meraki access points, routers, switches, and firewalls. Second, I wanted to understand how network security policies get implemented across multiple locations, including things like network segmentation, VPNs, and traffic monitoring. Third, I hoped to improve my analytical and communication skills by working directly with my supervisor, Mr. Collins, to learn how cybersecurity principles translate into daily decisions.
My first day at Cavalier Logistics included the usual orientation activities such as safety briefings, data security training, and tours of the network operations area. My initial impression was quite positive also due to the company having a professional atmosphere, but people were also collaborative and willing to teach. What stood out most was that cybersecurity wasn’t treated like some background IT department; it was clearly important to every part of the business. During the orientation, the HR representative explicitly mentioned that network security incidents had cost the company significant revenue in previous years, which explained why security was taken so seriously across all departments. That made me realize I was joining an organization that had learned hard lessons about the business impact of cybersecurity failures.
2. Management Environment
I worked directly under Mr. Collins, the company’s Network Consultant, who served as both my supervisor and mentor. His management style was hands-on but also gave me room to learn independently. He didn’t just tell me what to do either, he encouraged me to observe, ask questions, and actually understand the systems we were working with. We had weekly meetings to review what I was working on, discuss any network issues that came up, and make sure my projects aligned with what the company needed.
What impressed me most about Mr. Collins’s approach was his emphasis on understanding the “why” behind every technical decision. When we reviewed firewall configurations, he wouldn’t just show me the rules, he would explain the business logic driving each policy. For example, when discussing why certain IP ranges were blocked, he’d trace it back to previous security incidents or compliance requirements from specific clients. This contextual teaching method helped me develop intuition about security architecture rather than just memorizing procedures. He also encourages me to question existing configurations and propose alternatives, which built my confidence in technical decision-making even as an intern.
Mr. Collins also modeled professional growth in meaningful ways. He regularly attended industry conferences and vendor training sessions, often sharing insights from these experiences during our meetings. He subscribed to multiple cybersecurity newsletters and threat intelligence feeds, demonstrating that staying current isn’t optional in this field. Watching him dedicate time to continuous learning, despite his busy schedule, reinforced that cybersecurity professionals must commit to lifelong education. He also connected me with other IT professionals in the company, creating networking opportunities that broadened my understanding of how different specializations collaborate.
The management structure at Cavalier includes specialized teams across IT, logistics coordination, accounting, and operations. The network security division plays a central role because if the network goes down, pretty much everything else stops working. I got to see how different departments communicated with each other, especially when network changes affected customer-facing systems or warehouse operations. It showed me that cybersecurity can’t exist in a vacuum, it has to support business goals, not just protect systems for the sake of protection.
One particularly illuminating experience involved sitting in on a cross-departmental meeting about implementing multi-factor authentication for warehouse management systems. The IT team advocated for strict security controls, while operations managers worried about slowing down time-sensitive shipping processes. Watching Mr. Collins navigate these competing priorities taught me valuable lessons about stakeholder management. He presented data on authentication times, proposed phased implementation, and demonstrated how security could actually improve efficiency by reducing password reset calls. This approach helped me understand that technical expertise alone isn’t enough, successful cybersecurity professionals must also be skilled negotiators who can translate security needs into language that resonates with different audiences.
The management culture emphasized accountability and fixing problems before they became bigger issues. Every configuration change, security update, or access modification had to be documented and reviewed. This reminded me of the chain of custody principles we learned in class, maintaining the integrity of data and keeping records is crucial for both security and compliance. Mr. Collins also emphasized ethical responsibility, which reinforced what I’d learned about how even small shortcuts in documentation could create long-term vulnerabilities.
I believe the management environment worked really well. The balance between supervision and independence gave me freedom to apply what I’d learned in class while still having professional guidance. I learned that good leadership in cybersecurity isn’t about micromanaging, it’s about creating an environment where people feel comfortable asking questions and taking their work seriously.
3. Work Duties & Assignments
As a Network Security Intern, I did a mix of hands-on configuration work and observation of larger enterprise systems. My main responsibilities included helping deploy, monitor, and document Cisco Meraki MR-56 Access Points, which provided cloud-managed wireless networking across multiple Cavalier facilities. I learned to use the Meraki dashboard to configure SSIDs set up network segmentation for staff and guest users and monitor performance metrics across all seven states where Cavalier operates. What impressed me most was how scalable the system was and how we could new sites remotely without taking anything offline.
Working with the Meraki system introduced me to the practical side of wireless security that textbooks can’t fully capture. I learned about the delicate balance between signal strength and security, too powerful and you’re broadcasting your network beyond your physical premises, creating opportunities for parking lot attacks; too weak and legitimate users experience connectivity issues. Mr. Collins showed me how to use heat mapping tools to optimize access point placement, ensuring adequate coverage while minimizing signal bleeding into public areas. I also learned to configure rogue access point detection, which automatically alerts administrators when unauthorized wireless devices appear on the network. During one incident, this system detected an employee who had connected a personal router to bypass network restrictions, a seemingly innocent action that could have created a significant security vulnerability.
One of the major projects involved working with Cisco FPR1010-NFGW-K9 Next Generation Firewalls. These devices are critical for maintaining secure connections and protecting data as it moves between networks. I worked with Mr. Collins to review firewall configurations, analyze traffic patterns, and verify that access control lists (ACLs) were blocking unauthorized activity. This gave me real insight into how modern firewalls use deep packet inspection and advanced threat detection to defend against breaches.
The firewall work particularly fascinated me because it revealed the cat and mouse nature of cybersecurity. During one session, Mr. Collins showed me the logs where the firewall had blocked hundreds of automated attacks originating from international IP addresses. These weren’t sophisticated attacks, just automated scripts scanning for common vulnerabilities, but their volume was staggering. I also learned about false positives and the challenges of tuning firewall rules to minimize traffic disruption. Finding that balance requires understanding both network behavior patterns and business operations.
I also spent time working with Cisco routers and switches. Mr. Collins showed me how to configure to VLANs to separate VoIP systems from data networks, which ensures both web applications and phone systems work properly. I got to see how properly configured access lists and routing policies prevent broadcast storms and keep the network reliable. This helped me connect the theoretical networking concepts from class to actual enterprise configurations.
Another learning experience was working with VeloCloud SD-WAN devices, which optimize wide-area network performance and provide redundancy across multiple ISP circuits. These systems help ensure that if one internet connection goes down, the network automatically switches to a backup. I shadowed Mr. Collins during ISP circuit installations and saw show coordination with vendors and troubleshooting protocols kept business running during outages. These experiences showed me that technical skill is important, but so is communication, you have to be able to explain issues clearly to service providers and other stakeholders.
One particularly memorable project involved documenting the company’s disaster recovery procedures. Mr. Collins assigned me to review existing documentation and identify gaps or outdated information. This task initially seemed tedious, but it taught me how crucial documentation is for business continuity. I discovered procedures referencing equipment that had been replaced years ago and contact information for vendors who no longer provided services. Updating this documentation meant speaking with various team members, verifying current procedures, and creating clear step-by-step guides. This project demonstrated that cybersecurity extends beyond technical implementation to include organizational preparedness, ensuring that when incidents occur, teams can respond quickly and effectively.
Looking back, these projects showed me how network security functions as a living system. Every device, from a firewall to a wireless access point, is a layer in the organization’s defense strategy. Getting to participate in this environment gave me a front-row seat to see how all these layers work together to protect the confidentiality, integrity, and availability of business operations.
4. Use of Cybersecurity Skills and Knowledge
I came into the internship with a decent foundation from my ODU classes, I understood the basics of encryption, authentication, access control, and network segmentation. Working with these concepts in a real production environment was completely different from taking exams about them. Everything was more connected and complicated than I expected. Working with the Cisco Meraki MR-56 Access Points was a good example. In some of my classes, I learned about how user segmentation and access policies as separate concepts. At Cavalier, I saw how they directly affected both network speed and security at the same time. The Meraki cloud dashboard was honestly fascinating; Mr. Collins could manage wireless access across all seven states from one screen. It made me realize how much cloud-based tools have changed IT work, especially for companies with multiple locations.
The practical application of encryption protocols was particularly eye-opening. From my classes, we discussed WPA3 and certificate-based authentication theoretically. At Cavalier, I helped implement these protocols and immediately encountered real-world complications. For instance, legacy devices used by warehouse scanners couldn’t support the latest encryption standards, forcing us to maintain separate network segments with older protocols. This created a security trade-off that required careful risk assessment, do we upgrade expensive equipment prematurely, or do we accept calculated risk while implementing compensating controls? These decisions involved cost-benefit analyses that classroom scenarios rarely capture.
Working with the Next Generation Firewalls really deepened my understanding of enterprise-level protection. Firewall rules aren’t just abstract configurations; they reflect the company’s actual operational priorities and balance usability with security. I also learned to read logs, analyze blocked traffic, and identify suspicious activity patterns. Configuring VLANs and access lists on routers and switches also helped me see how network segmentation can minimize the spread of potential breaches.
One of the most interesting lessons came from watching how VoIP systems and web applications are integrated securely. Seeing Mr. Collins configure VLANs to support VoIP showed me that cybersecurity goes beyond just protecting devices, it ensures reliable communication for the entire organization. I also got familiar with auditing configurations, documenting changes, and reviewing compliance logs. The on-the-job learning expanded my skill set way beyond the classroom. I got better at troubleshooting connectivity issues, using monitoring tools to interpret system alerts, and recognizing when automation can improve reliability. I also learned that human factors play a huge role in cybersecurity, even the most advanced hardware can fail if users ignore best practices or skip documentation. This changed how I think about the field: cybersecurity isn’t just a technical discipline, it’s an ongoing process of staying on top of threats that are continuously adapting.
5. ODU Curriculum Connection
My education at ODU gave me a strong foundation that translated well into my internship at Cavalier Logistics. Courses like CYSE 200T Cybersecurity, IT 205 Introduction to Object-Oriented Programming, IT 201 Introduction to Information Systems, CRJS 310 Cybercriminology: Foundations, and CYSE 406 Cyber Law, gave me the framework to understand what I was seeing and contributing to. Theories about layered defense, redundancy, and threat modeling became tangible when I worked with the company’s actual infrastructure. I could see how the discussions in one of my classes about the CIA Triad, which revolved around confidentiality, integrity, and availability, played out through access control configurations, firewall policies, and backup systems. Other ways that my classes helped me was not only preparing me with awareness but gave me information regarding VPN setups, encryption protocols, authentication, lessons on ethical hacking, and vulnerability assessment.
However, the internship also exposed areas where academic preparation meets real-world constraints. While ODU taught me to design and analyze secure networks conceptually, Cavalier Logistics taught me how to implement them practically within the limits of cost, business needs, and scalability. In the classroom, cybersecurity is often isolated from other business operations, but this internship showed me how deeply interconnected security is with finance, logistics, and human resources. Network downtime doesn’t just affect data, it disrupts shipments, delays transactions, and impacts the company’s reputation.
Through this experience, I also discovered new areas I want to learn more about. I developed a stronger interest in cyber risk auditing and compliance management, which align with my future goals in forensic accounting. The internship made it clear that the most effective cybersecurity professionals understand both the technical infrastructure and the organizational ecosystem that depends on it. ODU’s interdisciplinary approach prepared me well for this but the internship gave me the perspective and confidence to actually apply it.
6. Learning Outcomes Reflection
The first goal I set before starting was to gain hands-on experience with enterprise-grade networking tools and systems. I definitely achieved this through daily work with Cisco Meraki MR-56 access points, next-generation firewalls, routers, and switches. Each week brought new technical challenges, from configuring VLANs for traffic segmentation to checking VPN tunnel stability between Cavalier’s regional branches. By shadowing Mr. Collins during configuration reviews and change-control meetings, I learned now just how to do things, but why they’re done that way. For example, firewall rules weren’t just lines of code, they reflected carefully thought-out business policies that balanced operational access with risk tolerance. Being able to connect these technical decisions to organizational strategy confirmed that I was developing both technical competence and strategic awareness.
My second goal was to understand how cybersecurity supports business continuity across different locations. Cavalier Logistics was perfect for this because their operations span multiple time zones, and connectivity problems could, again, delay shipments and hurt client relationships. I saw firsthand how redundancy, through SD-WAN failover paths and cloud-managed wireless systems ensured that no single outage could shut down communication. During one incident when an ISP circuit briefly failed, I watched Mr. Collins redirect traffic through a backup link within minutes. Seeing that rapid response reinforced that cybersecurity is as much about resilience and recovery as it is about prevention.
The third goal was to develop professional communication and problem-solving skills, which I definitely accomplished. Early on, I sometimes hesitated to ask questions during technical discussions because I didn’t want to interrupt. Mr. Collins encouraged me to speak up, reminding me that asking questions is how you actually learn. Over time, I got more comfortable articulating technical observations clearly and concisely, and I learned to translate complex networking issues into language that non-technical staff could understand. That ability to communicate risk and recommend solutions across departments turned out to be one of the most valuable skills I gained.
An unexpected but equally important outcomes was developing a stronger sense of ethical responsibility. Handling access credentials, monitoring user activity, and viewing internal traffic data all required discretion and professionalism. The internship reinforced that cybersecurity practitioners are responsible for protecting trust, every log entry or configuration command has ethical implications. Taking this responsibility seriously deepened my respect for the field and confirmed that ethics isn’t just an abstract course topic, it’s a daily practice that defines your credibility.
7. Motivating or Exciting Aspects
The best part of the internship was knowing my work actually mattered. When I helped configure something that protected data from moving between warehouses, or when a firewall rule, I worked on blocked a potential threat, it felt real. It wasn’t just practice anymore, it was protecting actual company operations. I’ll admit, every successful deployment felt pretty satisfying because there is something motivating about seeing your preparation pay off, especially when you’re working with a team and know that clients are depending on this on this stuff to work correctly.
Working with cutting-edge technology in a real business setting is also exciting. Cisco’s Meraki dashboard fascinated me because it showed how cloud computing can change network administration. Through one interface, our team could monitor wireless devices across seven states, review bandwidth usage, and push firmware updates remotely. I gained new appreciation for how scalable cloud-based systems are and how they let small IT teams manage huge infrastructure efficiently. This experience helped me see the future of enterprise networking, where automation and visibility reduce human error and speed up response times.
Another motivating factor was the mentorship culture. Mr. Collins consistently connected technical lessons to bigger professional themes. For example, after trouble shooting a VLAN misconfiguration one day, he explained how similar issues could create serious vulnerabilities if left undocumented. These conversations transformed routine tasks into real learning moments and showed me how experienced professionals think strategically. They also taught me that mastering cybersecurity involves constant curiosity, willingness to adapt, and learning no matter what is new in the field.
The internship renewed my enthusiasm for combining cybersecurity with forensic accounting. I started imagining how similar investigative approaches could be applied to financial systems to detect fraud or anomalies. That realization got me genuinely excited about designing a career that combines technology with financial integrity.
8. Discouraging Aspects
The internship was great overall, but it definitely had some frustrating parts. The biggest one was not having access to the more critical production systems. I get why, they can’t let interns accidentally break important stuff, but it meant I spent a lot of time watching instead of doing it. During maintenance windows, I basically sat on the sidelines. At first, it was frustrating because I wanted to experience it hands-on and not just observing. Eventually I realized I was still learning a lot by watching Mr. Collins work through problems, and I started taking better notes so I could try things later in a test environment. But yeah, I wish I could’ve done more configuration work.
Another thing that took getting used to was the invisible nature of success in cybersecurity. In many cases, a day with no incidents just meant systems were working correctly, but that normalcy could feel anticlimactic. Unlike other fields where you can see your progress, network security often rewards silence and stability. It took time to accept that prevention, not reaction, is the real measure of success. Once I shifted my perspective, I found, in a way, a sense of accomplishment in maintaining security and ensuring calm rather than waiting for crises to be resolved.
I also occasionally felt the strain of communication gaps between departments. When technical jargon clashed with logistics terminology, misunderstandings could slow down decision-making. Watching Mr. Collins navigate those situations taught me the importance of empathy and clarity. Security professionals must translate risks into operational language that makes sense to non-technical people. Although these communication challenges were sometimes frustrating, they provided important lessons in diplomacy and patience, qualities that will help me in any collaborative environment.
9. Challenging Aspects
The most demanding part of the internship was learning to balance security, performance, and usability. Every configuration change involves trade-offs. Strengthening encryption could slow things down; tightening access controls might make things less convenient for remote users. Understanding how to strike the right balance requires both technical knowledge and understanding organizational priorities. Through testing and feedback, I learned that effective security design is as much an art as a science, it must protect without making it impossible to get work done.
Another major challenge was interpreting network anomalies in real time. When monitoring the Meraki dashboard or firewall logs, spikes in traffic or unusual IP connections could signal potential intrusions, but they required contact to understand. Early on, I found the volume of data overwhelming, but with guidance, I learned to filter alerts, establish baselines, and use data visualization to spot meaningful patterns. This process improved my analytical discipline and reinforced the importance of staying calm and evidence-based under pressure.
Time management also turned out to be harder than expected. Balancing multiple small projects, documentation updates, configuration checks, and troubleshooting tickets, required organizational skills beyond the purely technical. I developed a workflow using checklists and version-control notes to make sure nothing fell through the cracks. By the final week, I could handle overlapping tasks more efficiently, which proved to me that technical expertise must be supported by good planning.
The learning curve for enterprise-levels tools was steep. Cisco’s interface ecosystem, SD-WAN orchestration, and firewall policy syntax were intimidating at first. That challenge became something I’m proud of. Each time I figured out an unfamiliar log entry or fixed a configuration warning, I felt myself getting better. The process reinforced an important professional truth: competence comes from pushing through discomfort and leaning into complexity rather than avoiding it.
10. Recommendations for Future Interns
For students who follow in my footsteps at Cavalier Logistics, my first recommendation is to show up with strong foundational knowledge of networking principles. Understanding subnets, VLANs, routing tables, and OSI layers will make on-the-job learning much smoother. If you can read and interpret network diagrams, you’ll gain credibility. It’s also worth getting familiar with Cisco networking environments beforehand. Exploring free Cisco Networking Academy courses before starting would be really helpful.
I’d also recommend developing soft skills alongside technical ones. My most successful moments during the internship happened when I combined technical knowledge with being able to communicate clearly. Learning how to summarize findings for managers, creating accurate reports, and being knowledgeable about cybersecurity concepts is a great way to put yourself ahead of other interns too.
Approach every assignment with curiosity and humility. Some tasks, like labeling cables or organizing documentation, might seem trivial, but they’re crucial to maintain system organization. Treating small duties with the same care as high-profile projects show reliability and earns your mentor’s trust. Ask for feedback regularly, and when you hit limitations, use them as opportunities for independent research. Setting up a home lab or simulation environment can help you practice what you observe on site.
Future interns should take ethical responsibility seriously. At Cavalier Logistics, even routing network access involves sensitive client information. Understanding confidentiality agreements, documenting changes accurately, and avoiding shortcuts are non-negotiable. Your integrity builds your reputation; one careless action can undo months of clever work. Those who treat cybersecurity not just as technology but as a professional ethic will do well in this environment.
11. Conclusion
Looking back on my internship at Cavalier Logistics, I see it as a defining chapter in my academic and professional journey. It transformed classroom lessons into lived experience, showing me how cybersecurity protects what keeps modern businesses running, which is data and connectivity. I came in eager to learn about network security; I left understanding that security is the foundation supporting every organization process. Through exposure to Cisco technologies, SD-WAN architecture, and cloud management, I gained not only technical competence but also strategic awareness of how business and cybersecurity work together.
The biggest takeaway is that effective security is holistic. It depends equally on systems, people, and policies. The internship shows me how leadership, documentation, and communication reinforce technical defenses. It also deepened my appreciation for how different departments work together such as logistics specialists, accountants, and IT engineers all rely on one another’s precision. This insight has reshaped how I view my education at Old Dominion University. I now see my courses not as isolated courses or subjects, but as connected pieces of a larger professional picture.
As I continue my studies, I plan to focus on courses that combine data analytics, risk management and digital forensics. I am also pursuing certifications such as Certified Fraud Examiner (CFE) and Cisco Certified Network Associate (CCNA) to strengthen both my technical and investigative credentials. The internship confirmed my ambition to build a career that combines cybersecurity with forensic accounting which would be an area where I can help organizations detect, prevent, and analyze digital financial crimes.
This experience has reinforced my belief that cybersecurity is more than a career path; it is a commitment to protecting trust and organizational resilience. The lessons that I learned at Cavalier Logistics such as discipline, adaptability, and ethical integrity will continue to guide my academic work and professional conduct. I now see every configuration, audit, or report not as a routine task but as a contribution to a safer and more transparent digital world. The internship did not just teach me how to protect networks, it taught me how to think like someone responsible for protecting information, a perspective that will shape every step of my future career.