CYSE 368

Cybersecurity Internship

During my work as an analyst at CyberEye, LLC, I helped clients with operating system cleansing and setup, examined ransomware incidents, and searched system logs for signals of potential security vulnerabilities. For compliance and post-event evaluations, I painstakingly documented everything I observed. I worked with my team to handle any technological issues that arose. This program provided me with practical experience with computers and problem-solving, as well as the opportunity to use my safety knowledge in a real-world scenario.

Course Material

Attached below are my 6 reflective journals and my final internship paper.

  • Internship Journals

Journal 1

https://drive.google.com/file/d/1f9hMAESfRYSZSgZSSQsSWAz90YYERft4/view?usp=share_link

Journal 2

https://drive.google.com/file/d/1Wtn_rIQq01crKPa-X-lDC1f2aik8A7u8/view?usp=share_link

Journal 3

https://drive.google.com/file/d/1DsrjVumg9khx4XGtXQ3Ibt7NTyhUSTN9/view?usp=share_link

Journal 4

https://drive.google.com/file/d/1OjIxS2I858qsJhwR0QkO4HKQWFB1afmF/view?usp=share_link

Journal 5

https://drive.google.com/file/d/10T16ehuSU8axAwDrTeDAJeDrDYwu8kJu/view?usp=share_link

Journal 6

https://drive.google.com/file/d/1Wtn_rIQq01crKPa-X-lDC1f2aik8A7u8/view?usp=share_link

  • Internship Final paper

https://drive.google.com/file/d/1iANzBlPo6TBO_0ED9IsmSfrfvx4_lNQH/view?usp=sharing

 

Applying Course Knowledge

  • In my coursework, I learned foundational cybersecurity concepts like network security, incident response, and system administration, which directly relate to tasks I encountered during my internship. These classes provided the technical knowledge and problem-solving frameworks that prepared me to analyze threats, troubleshoot systems, and approach real-world IT challenges with confidence.
  • The concepts from my course texts, such as threat analysis, network security protocols, and incident response strategies, were directly applied in my internship through tasks like analyzing system logs and investigating ransomware cases. These principles provided a foundation for understanding real-world cybersecurity challenges, which I adapted and expanded upon during hands-on assignments.
  • Theories such as the CIA Triad (Confidentiality, Integrity, and Availability) and concepts like defense-in-depth and zero-trust security will be critical in my career in cybersecurity. These ideas form the basis for creating robust security strategies and frameworks to protect systems and data from evolving threats in the real world.

Skill Development

  • What new skills did you learn during the internship?
    • During my internship, I learned how to analyze system logs to identify vulnerabilities, investigate ransomware incidents, and perform operating system resets and setups for clients. Additionally, I developed skills in meticulous documentation, remote collaboration, and navigating specialized software like Kesaya for IT management.

Personal Development

  • How did you benefit personally from the internship experience?
    • I benefited personally from my internship by gaining confidence in my ability to apply cybersecurity concepts in real-world scenarios and tackling challenges in a professional setting. The experience also helped me improve my communication, time management, and problem-solving skills while reinforcing my passion for pursuing a career in cybersecurity.