
Identity Operations Intern – D&IT
Black & Veatch
internship
Posted on:
Location Type: Office
Location: Overland Park • Kansas • North Carolina • United States
Visit company websiteExplore more
Salary
💰 $18 - $34 per hour
Job Level
Tech Stack
About the role
- Perform analysis of current access controls to identify potential risks and develop action plans to address
- Partner with others to help develop our identity governance processes
- Help to implement potential strategies to limit access to sensitive data as part of our data security program
- Assist in further securing access to privileged accounts by working with PAM tools and related processes
- Exposure to and hands-on usage of identity and access monitoring tools and the possible controls that are implemented in a large company across cloud
- Research and evaluate security tools.
- Provide detail features of security tools and services.
- Assist with ServiceNow Security Projects & Tasks updates
- Assist with Cyber Policies & Standards updates and documentation
Requirements
- Currently pursuing a Bachelor’s or Master’s degree in Computer Science, Information Security, Computer Engineering, Management Information Systems, or a related major
- Effective communication and interpersonal skills (both written and verbal).
- Experience in accessing and analyzing data
- Ability to identify, analyze, and interpret patterns in data and produce relevant visualization.
- Knowledge and practical use of Python or other scripting languages for data analysis.
- Strong analytical, critical thinking, and problem-solving skills and the desire to learn.
- Current enrollment in Information Technology or related degree program.
Benefits
- 📊 Check your resume score for this job Improve your chances of getting an interview by checking your resume score before you apply. Check Resume Score
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
data analysisPythonscripting languagesidentity governanceaccess controlsdata securityprivileged access management (PAM)security tools evaluationdata visualizationcyber policies
Soft Skills
effective communicationinterpersonal skillsanalytical skillscritical thinkingproblem-solvingdesire to learn