Posted:
8/19/2024, 5:00:00 PM
Location(s):
Arkansas, United States ⋅ Bentonville, Arkansas, United States
Experience Level(s):
Internship
Field(s):
IT & Security
Position Summary...
What you'll do...
THIS REQUESITION IS FOR OUR SUMMER 2024 INTERNS- IF YOU ARE INTERESTED IN A SUMMER 2025 INTERNSHIP, REQS WILL OPEN SOON
Intrusion Acumen:
Requires knowledge of:
Security operations center processes; Major types of intrusions; Stakeholder segmentation; Cyber risk policies and standard operating procedures; Relevant data analytics tools and techniques.
To monitor, analyze, and remediate cyber events by adhering to standard operating procedures for an assigned domain. Runs commands and executes scripts for assigned areas of work. Communicates with stakeholders during troubleshooting events. Participates in security operations center processes and procedures by responding to stakeholder and business unit requests. Provides inputs for modifying alert logic and identifying new risk detection. Identifies risks and cyber attacks by leveraging relevant tools in an assigned domain/area of work.
Cyber Incident Management :
Requires knowledge of:
Cyber incident detection and reporting protocols; Types of cyber incidents; Types of data breaches; Categorization guidelines for cyber incidents; Industry standards and best practices in incident management; Key components of an incident management playbook; Criteria and requirements of a cyber incident response team; Cyber incident mitigation strategies; Data breach mitigation strategies
To review, prioritize, and escalate cyber incidents. Escalates alerts to relevant stakeholder groups following cyber incidents. Performs first responder troubleshooting on cyber-related, data-related, or security incidents according to pre-determined procedures. Analyzes incident reports, log files, and affected systems to identify threats and the root causes of cyber incidents. Performs cyber incident triage to assess the severity of cyber incidents and security implications; Implements approved processes or technologies to mitigate future cyber incidents.
Cyber Risk Management :
Requires knowledge of:
Cyber risk assessment and management techniques; Security risks, threats and vulnerabilities; Possible treatments of security risks, threats and vulnerabilities; Evolving security landscape and emerging cyber security threats; Assessment of potential business risks from security gaps.
To contribute towards development of cyber risk assessment and/or management techniques to identify security gaps and weaknesses in the business. Designs cyber risk assessments by consolidating insights from the business and various functions. Identifies cyber security risks, threats and vulnerabilities, and their impact on the organization. Identifies possible treatments for cyber risks, threats and vulnerabilities identified. Identifies and propose implementation of endorsed mitigation measures to address security gaps.
Exploratory Data Analysis:
Requires knowledge of:
Relevant Knowledge Discovery in Data (KDD) tools, applications, or scripting languages such as SQL, Oracle, Apache Mahout, MS Excel, Python; Statistical techniques (for example, mean, mode, median, variance, standard deviation, correlation, and sorting and grouping); Research analysis standards and activities; Documentation procedures such as drafting, editing, Bibliography format; Relevant Knowledge Discovery in Data (KDD) tools, applications, or scripting languages such as SQL, DB, SAS, Oracle, Apache Mahout, MS Excel, Python; KDD industry best practices and emerging trends.
To support the identification and application of statistical techniques based on requirements. Apply suitable technique models under direction from leadership. Support data collection and evaluation. Explore data using simple tools. Execute existing statistical models and explains the relationship to a client's situation. Analyzes data and compute descriptive statistics under guidance that identify trends, outliers, and correlations leveraging appropriate tools.
Infrastructure Design:
Requires knowledge of:
Software architecture; Distributed systems; Scalability; Design patterns; Disaster Recovery; TechStacks; Non-Functional Requirements; Security standards, frameworks, and methodologies (System Security Plan -SSP, Security Risk and Compliance Review- SRCR etc.)
To assist in creation of simple, modular, extensible and functional design for the product/solution in adherence to the requirements. Evaluate trade-offs while designing across multiple components in a system based on the business requirements. Convert HLD to create detailed design for specific modules / components of a product/system. Understand nuances of designing for disaster recovery.
Network Operations:
Requires knowledge of:
Network Monitoring and Alerting tools; Monitoring Metrics and KPIs(for example Availability, Mean time between Failure (MTBF), Mean Time To Recover (MTTR) etc.); Service Level Indicator (SLIs) (for example request latency, availability, error rate etc.)
To monitor network performance and highlight areas for further review to optimize network performance. Suggest metrics to monitor network performance effectively. Monitors current performance data to ensure adherence to defined SLOs for multiple network applications/systems. Determine thresholds for the monitoring metrics and trigger alerts based on those threshold.
Network Design:
Requires knowledge of:
Architectural blueprint design; Evaluate and balance industry standards and best practices with business needs of network - infrastructure designs; Identify optimal topologies, platforms, and protocols; Document associated design decisions and trade-off.
To translate a broader infrastructure design or blueprint into technical specifications and details to develop advanced addressing and routing, security, data center, and IP multicast complex architectures with VPN and wireless domains. Draft design specifications of infrastructure network components that address usage, performance and security requirements.
Security Architecture:
Requires knowledge of:
Secure Software Development, Data protection, Cryptography, Key management, Identity and Access Management; Industry Standard Authentication mechanisms; Cloud security and Governance tools; Audit, compliance standards; Static CodeScanning Tools; High level Vulnerability Assessment and Penetration Testing (VAPT); Legal policies (e.g. SOX, GDPR, GLBA, etc.
To perform vulnerability assessments and infrastructure security reviews for applications and their supporting network infrastructure; and performing secure coding review. Ensure security policy requirements are properly applied to applications throughout the entire development life cycle. Ensure compliance of the solution with applicable legal policies (e.g. SOX, GDPR, GLBA, etc).
Data Visualization:
Requires knowledge of:
Visualization guidelines and best-practices for complex data types; Multiple data visualization tools (for example, Python, R libraries, GGplot, Matplotlib, Ploty, Tableau, PowerBI etc.); Advanced visualization techniques/ tools; Multiple story plots and structures (OABCDE); Communication & influencing techniques; Emotional intelligence.
To generate appropriate graphical representations of data and model outcomes. Understands customer requirements to design appropriate data representation for multiple data sets. Work with User Experience designers and User Interface engineers as required to build front end applications. Presents to and influences the team and business audience using the appropriate data visualization frameworks and conveys clear messages through business and stakeholder understanding. Customize communication style based on stakeholder under guidance, and leverages rational arguments. Guide and mentor junior associates on story types, structures, and techniques based on context.
Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales.
Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities.
Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices.
Live our Values - Culture Champion - Models the Walmart values to foster our culture; holds oneself accountable; and supports Walmart's commitment to communities, corporate social responsibility, and sustainability; maintains and promotes the highest standards of integrity, ethics and compliance.
Live our Values - Servant Leadership - Is consistently humble, self-aware, honest, and transparent.
Embrace Change - Curiosity & Courage - Demonstrates curiosity and a growth mindset; supports innovation and intelligent risk-taking; and exhibits resilience in the face of setbacks.
Embrace Change - Digital Transformation & Change - Implements and supports continuous improvements and willingly embraces new digital tools and ways of working.
Deliver for the Customer - Customer Focus - Delivers results while putting the customer first and applying an omnimerchant mindset and the EDLP and EDLC business models to all plans.
Deliver for the Customer - Strategic Thinking - Adopts a broad perspective that considers data, analytics, customer insights, and different parts of the business when making plans.
Focus on our Associates - Diversity, Equity & Inclusion - Embraces diversity in all its forms and actively supports diversity of ideas and perspectives, as well as diversity goal programs.
Focus on our Associates - Collaboration & Influence - Builds strong and trusting relationships with team members and business partners; works collaboratively to achieve objectives; communicates with impact to a range of audiences; and demonstrates energy and positivity for own work.
Focus on our Associates - Talent Management - Contributes to an environment allowing everyone to bring their best selves to work, demonstrates engagement and commitment to the team, and recognizes others' contributions and accomplishments.
Minimum Qualifications:
You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable.
For information about PTO, see https://one.walmart.com/notices.
Live Better U is a Walmart-paid education benefit program for full-time and part-time associates in Walmart and Sam's Club facilities. Programs range from high school completion to bachelor's degrees, including English Language Learning and short-form certificates. Tuition, books, and fees are completely paid for by Walmart.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms.
For information about benefits and eligibility, see One.Walmart.
The annual salary range for this position is $80,000.00-$155,000.00
Additional compensation includes annual or quarterly performance bonuses.
Additional compensation for certain positions may also include:
- Stock
Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Option 1: Bachelor’s degree in computer science, information technology, engineering, information systems, cybersecurity or related area.Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
Certification in Security+, Network+, GISF, CISA ,CISSP, CCSP, or GCIH, We value candidates with a background in creating inclusive digital experiences, demonstrating knowledge in implementing Web Content Accessibility Guidelines (WCAG) 2.2 AA standards, assistive technologies, and integrating digital accessibility seamlessly. The ideal candidate would have knowledge of accessibility best practices and join us as we continue to create accessible products and services following Walmart’s accessibility standards and guidelines for supporting an inclusive culture.Website: http://www.walmart.com/
Headquarter Location: Bentonville, Arkansas, United States
Employee Count: 10001+
Year Founded: 1962
IPO Status: Public
Last Funding Type: Post-IPO Debt
Industries: E-Commerce ⋅ Grocery ⋅ Retail ⋅ Retail Technology ⋅ Shopping