Describe your experience? Anybody staying on part-time? Anybody have a lead on a permanent job?
Reader Interactions
Comments
Aaroush Bhanotsays
I began by working on phishing emails reported by our associates using the Phish Alert Button. With the intensive training and mentorship from the team, I was soon able to independently investigate emails to determine whether they were clean, malicious, or spam. I am grateful to the team for trusting me with the responsibility of handling the phishing email tools and contributing to on-going investigations with these tools. Over the past two months, I maintained an SLA of 98.2% and handled 3311 suspected phishing emails. I was also responsible identifying and initiating the removal of 2236 additional threats from the environment.
Additionally, I developed an automation flow for the Daily Threat Advisory, a core report sent out daily to the Information Security Team detailing external threats and necessary actions. My automation streamlines the process by allowing the sender to input information through a form, which then creates planner items with the task descriptions and checklist items assigned to specific teams. Furthermore, it generates a well-formatted email sent to the information security team and creates SharePoint items for backup. I had the opportunity to lead an investigation of a cyber incident by managing communications with a user who clicked a malicious link. A takeaway from the successful investigation was the importance of clear communication along with policy enforcement. The milestones for my next two weeks include writing an SOP, documenting success criteria for new vendors, work on communications to switch to the new Daily threat Advisory process, optimizing Microsoft Azure Network Security logs, and continuing to contribute to incident response procedures.
I have accepted an offer to continue working part-time at WSFS Bank as a Cyber Threat Intelligence Analyst until I graduate.
Aaroush Bhanot says
I began by working on phishing emails reported by our associates using the Phish Alert Button. With the intensive training and mentorship from the team, I was soon able to independently investigate emails to determine whether they were clean, malicious, or spam. I am grateful to the team for trusting me with the responsibility of handling the phishing email tools and contributing to on-going investigations with these tools. Over the past two months, I maintained an SLA of 98.2% and handled 3311 suspected phishing emails. I was also responsible identifying and initiating the removal of 2236 additional threats from the environment.
Additionally, I developed an automation flow for the Daily Threat Advisory, a core report sent out daily to the Information Security Team detailing external threats and necessary actions. My automation streamlines the process by allowing the sender to input information through a form, which then creates planner items with the task descriptions and checklist items assigned to specific teams. Furthermore, it generates a well-formatted email sent to the information security team and creates SharePoint items for backup. I had the opportunity to lead an investigation of a cyber incident by managing communications with a user who clicked a malicious link. A takeaway from the successful investigation was the importance of clear communication along with policy enforcement. The milestones for my next two weeks include writing an SOP, documenting success criteria for new vendors, work on communications to switch to the new Daily threat Advisory process, optimizing Microsoft Azure Network Security logs, and continuing to contribute to incident response procedures.
I have accepted an offer to continue working part-time at WSFS Bank as a Cyber Threat Intelligence Analyst until I graduate.