CNF Intern
PURPOSE:
The Internship Program will provide students with practical, hands-on experience and allow the students to explore a myriad of opportunities in their future careers.
GOAL
To develop knowledge, understanding, skills and create a growth opportunity for college students or graduates seeking a technical career. Teaching students in a professional environment in preparation for their career planning and development through helping them identify their skills, values, interests and providing the tools for students to become successful in a real-world setting.
MINIMUM/GENERAL EXPERIENCE:
Undergraduate students with a minimum of 90 credit hours or graduate students. Candidates working towards earning a degree in computer science, computer engineering, electrical engineering, or software development/software engineering. Candidates interested in related course work such as physics, mathematics, cybersecurity, computer information systems, etc., will also be considered. Candidates must be in good academic standing.
Candidates must be a US Citizen who meets eligibility requirements to obtain a Department of Defense security clearance.
Candidates should be familiar with working in a collaborative team environment, should have experience with written and verbal communication skills, the ability to convey technical ideas in a clear, logical fashion, and the ability to translate technical data into easily consumable, actionable requirements.
FUNCTIONAL TECHNICAL EXPOSURE:
Candidates may be placed in one or more development areas, depending on personal skillsets, interest areas, and team needs. They will be exposed to many of the following CNF development processes and practices during their internship:
- Agile development, including DevOps/DevSecOps infrastructures and development tools
- Git-managed team projects, Jira, and Confluence
- Software development, programming in C/C++ and/or Python
- Linux-based command line,scripting, Bash
- Developing embedded applications or RTOS applications
- Designing, developing, integrating, testing, and deploying solutions
- CI/CD processes, including performance monitoring, task execution, YAML development, and development and deployment of Linux packages
- Networking concepts
- VPN technology
- VMware infrastructure
- Visualization technology
- Operating systems
- Vulnerability management
- Technical problem solving
Functional dayto day activities may include:
- Assist development and integration teams with development of cyber operations applications. Team with developers to design, develop, test, and document software applications in the Windows and Unix environments. Translate customer requirements into software design documents and other documentation to support successful operational use.
- Assist development and integration teams with solving hardware/software engineering problems. Provide technical support during all phases of hardware/software design analysis,development, integration, and implementation. Provideinput on the appropriate use of technologies to solve real-world engineering problems. Learn and work on technologies focused on embedded systems and components.
- Assist development and integration teams with the designing, coding, and testing of commercialinformation assurance/cybersecurity applications and software following operational requirements, established quality standards, and production schedules. Analyze and model data and business processes, with network security as a prime consideration.
- Assist development and integration teams with designing and architecting enterprise- level secure automated systems by leveraging existing tools and technologies, or by identifying and validating requirements and initiating new development efforts. Develop and test code to combine various information assurance/cybersecurity technologies into single or integrated solutions. Document the design, code, and testing of applications, technologies, and cybersecurity tools/capabilities.
- Assist IT administrators in help desk triage, ticketing management and support. Follow IT issue from employee request for assistance to issue resolution. Assist in troubleshooting root-cause, finding solution, resolving and ticket documentation.
- Assist cyber professionals in vulnerability scanning, research, and mitigation. Follow the path of vulnerabilities from discovery to resolution and performing trend analysis to determine average vulnerability resolution times.
- Assist training department in creating, deploying and managing computer-based training using Moodle Training Software.
- Assist IT administrators in the day-to-day management of an IT infrastructure including help desk support, backup and recovery, network service delivery and planning for growth expansion.
EDUCATION REQUIREMENTS:
Undergraduate students with a minimum of 90 credit hours or graduate students. Accepted Degrees:
- Electrical Engineering
- Software Development
- Software Engineering
- Computer Science
- Computer Engineering
- Physics/Mathematics
- Cyber Security
- Computer Information
LOCATION:
San Antonio, Texas