In order to foster the development of future leaders who are passionate about protecting everyone under the sun, Cylance launched its first internship program this summer. Twelve college students from around the country with backgrounds ranging from finance to software engineering to sales, join us in our Irvine headquarters offices each day to help tackle the next generation of challenges facing cybersecurity professionals, and to learn more about the wider applications of artificial intelligence.
Addressing the Cybersecurity Skills Gap
The program was, in part, inspired by the lack of qualified candidates in the growing cybersecurity marketplace. The hope is that future classes of undergraduates will be inspired to consider pursuing careers in cybersecurity in order to help fill the current skills gap.
“We want this to be a meaningful experience for the interns in which they can experience a modern business environment and learn all about cybersecurity, while also helping to support some of the workload from their managers,” said Janice Gill-Hester, one of the Cylance internship program coordinators.
At Cylance, summer interns are treated like full-time employees, with complete responsibility of relevant tasks and access to real-world business operations. By sitting in on daily meetings and planning sessions with executives, and working cross-functionally to help other teams, Cylance interns develop a sense of business etiquette and helps interns gain confidence in the workplace.
“The best part about the Cylance internship program is how closely it brings all the interns together from different departments within the company, in both formal and informal settings,” said software engineering intern Ali Shahbaz. “This has helped me understand how people from diverse backgrounds approach the same problem in different ways.”
In addition to developing teamwork and collaboration skills, the interns attend weekly workshops that teach them critical software skills, resume building, and networking. They (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Hanna Dasgupta. Read the original post at: Cylance Blog