Posted:
8/19/2024, 5:00:00 PM
Location(s):
Arkansas, United States ⋅ Bentonville, Arkansas, United States
Experience Level(s):
Internship
Field(s):
IT & Security
Position Summary...
What you'll do...
THIS REQUESITION IS FOR OUR SUMMER 2024 INTERNS- IF YOU ARE INTERESTED IN A SUMMER 2025 INTERNSHIP, REQS WILL OPEN SOON
Intrusion Acumen:
Requires knowledge of:
Security operations center processes; Major types of intrusions; Stakeholder segmentation; Cyber risk policies and standard operating procedures; Relevant data analytics tools and techniques.
To mentor team members in monitoring, analyzing, and remediating cyber events by adhering to standard operating procedures. Guides team members in running commands and executing scripts. Drives protocols for communicating with stakeholders during troubleshooting events and researches new cybersecurity alerts. Leads and develops new security operations center processes and procedures by responding to stakeholder and business unit requests. Modifies alert logic for higher fidelity and identifies new risk detection. Drives the identification of advanced risks and cyber attacks by leveraging big data analytics.
Cyber Incident Management:
Requires knowledge of:
Cyber incident detection and reporting protocols; Types of cyber incidents; Types of data breaches; Categorization guidelines for cyber incidents; Industry standards and best practices in incident management; Key components of an incident management playbook; Criteria and requirements of a cyber incident response team; Cyber incident mitigation strategies; Data breach mitigation strategies
To develop mechanisms or threat signatures that trigger cyber incident alerts to relevant parties and systems. Integrates cyber-related and data-related information, alerts, and analysis from detection system logs to develop a holistic view of cyber incidents. Develops key insights and impacts from analyses of cyber incidents. Manages the containment of cyber-related and data-related incidents within the organization. Leads the recovery of contained security incidents. Establishes mitigation and prevention processes and policies. Drives the implementation of mitigation processes and policies.
Cyber Risk Management:
Requires knowledge of:
Cyber risk assessment and management techniques; Security risks, threats and vulnerabilities; Possible treatments of security risks, threats and vulnerabilities; Evolving security landscape and emerging cyber security threats; Assessment of potential business risks from security gaps.
To contribute towards development of cyber risk assessment and/or management techniques to identify security gaps and weaknesses in the business. Designs cyber risk assessments by consolidating insights from the business and various functions. Identifies cyber security risks, threats and vulnerabilities, and their impact on the organization. Identifies possible treatments for cyber risks, threats and vulnerabilities identified. Identifies and propose implementation of endorsed mitigation measures to address security gaps.
Exploratory Data Analysis:
Requires knowledge of:
Relevant Knowledge Discovery in Data (KDD) tools, applications, or scripting languages such as SQL, Oracle, Apache Mahout, MS Excel, Python; Statistical techniques (for example, mean, mode, median, variance, standard deviation, correlation, and sorting and grouping); Research analysis standards and activities; Documentation procedures such as drafting, editing, Bibliography format; Relevant Knowledge Discovery in Data (KDD) tools, applications, or scripting languages such as SQL, DB, SAS, Oracle, Apache Mahout, MS Excel,Python; KDD industry best practices and emerging trends.
To collect and tabulate data and evaluates results to determine accuracy, validity, and applicability. Supports the identification and application of statistical techniques based on requirements. Applies suitable technique under direction from leadership. Assists in the planning, design and implementation of an exploratory data analysis research projects. Understands existing statistical models and identify and recommend statistical models based on hypothesis. Uses advanced Knowledge in Data Discovery tools to write queries and analyze data to identify patterns, trends, outliers, and correlations. Conduct statistical analysis(for example hypothesis tests, confidence intervals) and builds basic statistical models using relevant packages/software suites.
Infrastructure Design:
Requires knowledge of:
Software architecture; Distributed systems; Scalability; Design patterns; Disaster Recovery; TechStacks; Non-Functional Requirements; Security standards, frameworks, and methodologies (System Security Plan -SSP, Security Risk and Compliance Review- SRCR etc.)
To assist in creation of simple, modular, extensible and functional design for the product/solution in adherence to the requirements. Evaluate trade-offs while designing across multiple components in a system based on the business requirements. Convert HLD to create detailed design for specific modules / components of a product/system. Understand nuances of designing for disaster recovery.
Network Operations:
Requires knowledge of:
Network Monitoring and Alerting tools; Monitoring Metrics and KPIs(for example Availability, Mean time between Failure (MTBF), Mean Time To Recover (MTTR) etc.); Service Level Indicator (SLIs) (for example request latency, availability, error rate etc.)
To review network performance and determine areas for improvement to optimize and align network performance with business needs. Identify gaps and recommend changes to address missing or sub optimal areas of monitoring. Set altering priorities by identifying the most important systems based on their criticality. Monitor the function and performance infrastructure services have on platform level components and applications. Right-size IT resources to meet current and future business requirements in a cost-effective within a domain/ pillar.
Network Design:
Requires knowledge of:
Architectural blueprint design; Evaluate and balance industry standards and best practices with business needs of network - infrastructure designs; Identify optimal topologies, platforms, and protocols; Document associated design decisions and trade-offs.
To analyze organization requirements to determine the infrastructure network parameters and policies needed to support them. Evaluate and optimize network designs created by the team on performance based on expected business needs, usage and traffic volume. Evaluate and document design specific KPIs and Service Level Objectives (SLOs). Establish the SLOs/Service Level Agreement (SLAs) to determine the availability goals of the network systems/services.
Security Architecture:
Requires knowledge of:
Secure Software Development, Data protection, Cryptography, Key management, Identity and Access Management; Industry Standard Authentication mechanisms; Cloud security and Governance tools; Audit, compliance standards; Static Code Scanning Tools; High level Vulnerability Assessment and Penetration Testing (VAPT); Legal policies (e.g. SOX, GDPR, GLBA, etc).
To establish security and compliance baseline and understand per-project risks. Educate team on the topics of secure programming and deployment by conducting technical security awareness training. Formally control the software design process and validate utilization of secure components. Support ad hoc reviews of software design to ensure baseline mitigations for known risks.
Data Visualization:
Requires knowledge of:
Visualization guidelines and best-practices for complex data types; Multiple data visualization tools (for example, Python, R libraries, GGplot, Matplotlib, Ploty, Tableau, PowerBI etc.); Advanced visualization techniques/ tools; Multiple story plots and structures (OABCDE); Communication & influencing techniques; Emotional intelligence.
To generate appropriate graphical representations of data and model outcomes. Understands customer requirements to design appropriate data representation for multiple data sets. Work with User Experience designers and User Interface engineers as required to build front end applications. Presents to and influences the team and business audience using the appropriate data visualization frameworks and conveys clear messages through business and stakeholder understanding. Customize communication style based on stakeholder under guidance, and leverages rational arguments. Guide and mentor junior associates types, structures, and techniques based on context.
Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales.
Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities.
Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices.
Live our Values - Culture Champion - Models the Walmart values to foster our culture; holds oneself accountable; and supports Walmart's commitment to communities, corporate social responsibility, and sustainability; maintains and promotes the highest standards of integrity, ethics and compliance.
Live our Values - Servant Leadership - Is consistently humble, self-aware, honest, and transparent.
Embrace Change - Curiosity & Courage - Demonstrates curiosity and a growth mindset; supports innovation and intelligent risk-taking; and exhibits resilience in the face of setbacks.
Embrace Change - Digital Transformation & Change - Implements and supports continuous improvements and willingly embraces new digital tools and ways of working.
Deliver for the Customer - Customer Focus - Delivers results while putting the customer first and applying an omnimerchant mindset and the EDLP and EDLC business models to all plans.
Deliver for the Customer - Strategic Thinking - Adopts a broad perspective that considers data, analytics, customer insights, and different parts of the business when making plans.
Focus on our Associates - Diversity, Equity & Inclusion - Embraces diversity in all its forms and actively supports diversity of ideas and perspectives, as well as diversity goal programs.
Focus on our Associates - Collaboration & Influence - Builds strong and trusting relationships with team members and business partners; works collaboratively and cross-functionally to achieve objectives; and communicates with energy and positivity to motivate, influence, and inspire commitment and action.
Focus on our Associates - Talent Management - Contributes to an environment allowing everyone to bring their best selves to work, demonstrates engagement and commitment to the team, and recognizes others' contributions and accomplishments.
Minimum Qualifications:
You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable.
For information about PTO, see https://one.walmart.com/notices.
Live Better U is a Walmart-paid education benefit program for full-time and part-time associates in Walmart and Sam's Club facilities. Programs range from high school completion to bachelor's degrees, including English Language Learning and short-form certificates. Tuition, books, and fees are completely paid for by Walmart.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms.
For information about benefits and eligibility, see One.Walmart.
The annual salary range for this position is $90,000.00-$180,000.00
Additional compensation includes annual or quarterly performance bonuses.
Additional compensation for certain positions may also include:
- Stock
Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Option 1: Bachelor’s degree in computer science, information technology, engineering, information systems, cybersecurity or related area and 2years’ experience in intrusion analysis or related area at a technology, retail, or data-driven company.Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
Certification in Security+, Network+, GISF, CISA ,CISSP, CCSP, or GCIH, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area, We value candidates with a background in creating inclusive digital experiences, demonstrating knowledge in implementing Web Content Accessibility Guidelines (WCAG) 2.2 AA standards, assistive technologies, and integrating digital accessibility seamlessly. The ideal candidate would have knowledge of accessibility best practices and join us as we continue to create accessible products and services following Walmart’s accessibility standards and guidelines for supporting an inclusive culture.Website: http://www.walmart.com/
Headquarter Location: Bentonville, Arkansas, United States
Employee Count: 10001+
Year Founded: 1962
IPO Status: Public
Last Funding Type: Post-IPO Debt
Industries: E-Commerce ⋅ Grocery ⋅ Retail ⋅ Retail Technology ⋅ Shopping