SlideShare uma empresa Scribd logo
1 de 51
Baixar para ler offline
WiCyS Career Fair
Job Seeker Handbook
#WiCySCareerFair
Friday, March 31 3pm-6.30pm | Saturday, April 1 10.45am-1pm
Arizona Ballroom Foyer
A
C
B
1
2&3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
39
40
41
42
43
44
45
46
47
Arizona Ballroom
38
48
Page 3
Sponsor Floorplan Key
A Fidelity Investments
B Cisco
C Facebook
1 AT&T
2+3 Intel
4 Protiviti
5 Department of Homeland Security
6 Nat’l Cyberwatch / Prince George's CC
7 Google
8 CERT Division of Carnegie Mellon, SW Engr Inst
9 Tennessee Tech
10 Target
11 Stroz Friedberg
12 Carnegie Mellon University-Heinz College
13 Worcester Polytechnic Institute
14 Coalfire
15 CyberTraining 365
16 Columbus State University
17 Raytheon
18 State Farm
19 Naval Sea Systems Command (NAVSEA)
20 Marine Corps Systems Command
21 Kroll
22 CyberSecJobs.com
23 University of Texas Dallas
24 Bank of America
25 Johns Hopkins Applied Physics Laboratory
27 University of Washington Bothell
28 Sandia National Labs
29 MIT Lincoln Laboratory
30 Honeywell
31 IBM Security
32 Defense Point Security
33 Institute for Defense Analyses
34 CISSE
35 Navy Cyber Warfare Development Group
36 SANS Technology Institute
37 University of Arizona
38 Palo Alto Networks
39 Endgame
40 Harris
41 CyberWatch West Whatcom College
42 Northrop Grumman
44 Adobe
45 Aetna
46 Carnegie Mellon, Info Networking Institute
47
48 ODNI - IC Communities (FBI, NSA)
Page 4
Adobe
www.adobe.com Booth 44
Adobe is known as a place where art intersects science — a place where
data scientists, engineers, and researchers go when they want their
ingenuity and creativity to have a real-world impact on the way people live,
work and play with technology.
Here, engineering means being part of a global company and creating
solutions that millions recognize and use. You’ll build and develop incredible
desktop and mobile products and services that transform the way people
create digital content. And whether you want to manage teams and drive
strategy or simply be the best at the development work you do, you’ll make
your mark on products admired around the world.
Not only that, Adobe is one of the largest data collection platforms in the
world, managing approximately 35 petabytes of customer data and
processing one trillion transactions per quarter. But it’s not just the quantity
of data — it’s the quality of the work life that makes this an amazing time to
be at Adobe. Join us to turn data into impact, your ideas into product and
see your theories come to life.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 5
Aetna
www.aetna.com Booth 45
As one of the nation's leading diversified health care benefits companies,
Aetna provides people with information and resources to help them make
better informed health care decisions. Aetna’s health insurance products
include medical, pharmacy, dental, behavioral health, group life and disability
plans. Aetna also provides extended services for health care management,
workers' compensation administration and health information technology.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 6
AT&T
www.att.com Booth 1
AT&T helps connect millions around the globe with leading entertainment,
mobile, high-speed internet and voice services. Our people make it all
happen. As the world’s largest provider of pay TV, our employees deliver
entertainment to our customers in the U.S. and 11 Latin American countries.
It’s also our teams that give our mobile customers the global coverage they
need while helping businesses worldwide serve their customers better with
mobility and secure cloud solutions. With our internships, development
programs, and whole range of opportunities across all areas of our business,
we’re always looking for the next generation of leaders and innovators ready
to put their stamp on #LifeAtATT. Got a passion for the web and defending
cyber threats? Learn what it takes to protect one of the world’s largest
networks. Be the future today at www.att.jobs/college. And don’t forget to
check out our on-campus events happening near you.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 7
Bank of America
campus.bankofamerica.com Booth 24
To help make financial lives better, through the power of every connection. HIRING
Undergraduate
sophomores and juniors
looking for summer
internships in cyber
security
Page 8
Carnegie Mellon University-Heinz College
www.heinz.cmu.edu Booth 12
Carnegie Mellon University - Heinz College: School of Information
Systems & Management
We offer graduate degree options designed for early careerists and
experienced professionals. We offer the top-ranked online, hybrid and on-
campus programs (master’s, Ph.D. and certificate) in cyber security in the
world.
As our world becomes increasingly digitized, the privacy, intellectual property
and fraud risks continue to grow. These cyber threats are highly relevant to
all sectors of the economy, which is driving a major talent shortage for the
information security industry. Our programs are educating talented and
highly motivated individuals to meet the growing needs in this field.
Heinz College is at the nexus of technology, analytics and leadership. Our
programs give students flexibility in structuring their studies and provide
excellent career outcomes.
You'll gain strong problem solving and management skills, strengthen your
ability to communicate in the workplace, lead and participate in teams and
apply your classroom learning in real-world settings. Our curriculum is skills-
based and is reviewed regularly by employers who help us ensure we are
teaching relevant, needed skills. Our alumni lead and manage public,
private, and non-profit organizations in the US and around the world.
Our Information Systems & Security programs provide skills that lead to
careers at high tech firms (Google, Microsoft), consulting firms
(PriceWaterhouseCoopers, Ernst & Young), the financial industry (Credit
Suisse, JP Morgan Chase), the federal government and FFRDC's (Sandia).
Our graduates go to work for companies in places like New York, Silicon
Valley, San Francisco and Washington, DC.
SEEKING
Full-time, on-campus master’s
program: Information Security
Policy and Management
(MSISPM)
Full-time, on-campus generalist
master’s degree with a
concentration in cybersecurity:
Information Systems
Management (MISM)
Part-time, online or on-campus
master’s degree: Information
Technology (MSIT)
Full-time, on-campus Ph.D.
program: Ph.D. in Information
Systems and Management
(PhD)
Certificate program via hybrid
delivery: CISO Certificate
Program
Our financial aid strategy
supports the school's goal of
enrolling and educating a
talented, dynamic and diverse
student body. Prospective
students are encouraged to
learn more about the
SCHOLARSHIPS &
FELLOWSHIPS we offer to our
degree-seeking students
including merit-based
scholarships, partner-based
scholarships and other funding
(awarded at the time of
admission by Heinz College)
specific to their program of
interest.
Page 9
Carnegie Mellon University,
Information Networking Institute
www.ini.cmu.edu Booth 46
As a highly competitive department, the INI considers all accepted applicants
for financial awards in an amount that varies based on need and merit.
Through corporate and government programs, several unique opportunities
in the form of partial and full tuition scholarships, fellowships and awards are
available to INI students, including the CyberCorps® Scholarship for
Service, Director's Fellowship, Presidential Fellowship, Executive Women's
Forum INI Fellowship and others. To learn more about financial opportunities
at the INI, visit ini.cmu.edu.
SEEKING
Scholarship for Service,
Executive Women's
Forum-INI Fellowship,
Director's Fellowship
Page 10
CERT Division of Carnegie Mellon,
Software Engineering Institute
www.cert.org Booth 8
The Software Engineering Institute (SEI) at Carnegie Mellon University conducts research and
development in software and systems engineering, cybersecurity, and other related areas.
Bringing innovation to the government
The SEI is one of 10 Federally Funded Research and Development Centers (FFRDCs) sponsored by
the U.S. Department of Defense (DoD), one of only three chartered under the Research and
Development Laboratories category. Like all FFRDCs, the SEI is not for profit, is not part of industry,
and cannot compete with other organizations. However, the SEI is the only FFRDC sponsored by the
DoD that can work with non-DoD organizations. This enables us to bring private-sector innovations to
the government in addition to the innovative and collaborative work we do with the university and with
government agencies. We support government initiatives by conducting research and development
that is objective, long-term, and free from the constraints of commercialism.
Our Mission
We support the defense of the United States by advancing the science, technologies, and practices
needed to acquire, develop, operate, and sustain software systems that are innovative, affordable,
trustworthy, and enduring.
While the work of the SEI often focuses on the needs of the Department of Defense, we also work
extensively with the private sector and academia in an array of disciplines. Our activities in the areas
of research, prototyping, mission application, and technology transfer are heavily interrelated and are
relevant to a broad range of problem sets.
Closing the gap between research and use
The SEI is unique in its ability to innovate, taking concepts through R&D and ultimately into use. We
build on a strong foundation of theoretical research by creating prototypes, conducting demonstrations
and real-world pilots, developing training, publishing our findings, and delivering capabilities that
organizations can use. We have the hands-on technical expertise to harden critical infrastructure and
support the missions of the DoD, the intelligence community, federal departments, government
agencies, and law enforcement.
Part of the Carnegie Mellon University Community
The SEI is based at Carnegie Mellon University, a national and international leader in higher
education and research and a university at the forefront of cyber missions and software initiatives.
The university provides the SEI with infrastructure and business processes. Our technical staff are
part of the university's world-class community of researchers and innovators. We collaborate with
Carnegie Mellon University on major research initiatives, contributing to the university's intellectual
capital through research, collaboration, teaching, and strong management practices.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 11
Cisco
www.cisco.com Booth B
Cybersecurity is our top priority in the Security and Trust Organization. It
includes investment in our people, process, technology and polices.
Pervasive security requires employees, vendors, partners, and customers to
understand their role in the cybersecurity equation. Embedding processes
into the business helps us identify vulnerabilities and remediate issues
quickly. Cisco continually invests in security and resilience innovations that
help to mitigate today’s advanced threats. Our policies are designed to
protect your organization and investments across people, processes, and
technology. www.cisco.com/c/en/us/about/careers/university/software.html
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 12
CISSE
www.cisse.info Booth 34
For 21 years CISSE has supported Cyber Security educators, researchers
and practitioners in their efforts to improve curricula and foster discussion of
current & emerging trends. We gather annually for a three day conference to
share ideas, present papers, listen to thought leaders and recharge. This
year we will be at the JW Marriott Resort 7 Spa in Las Vegas, NV, June 12-
14, 2017.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 13
Coalfire Systems
www.coalfire.com Booth 14
Coalfire helps organizations comply with global financial, government,
industry and healthcare mandates while helping build the IT infrastructure
and security systems that will protect their business from security breaches
and data theft. The company is a leading provider of IT advisory services for
security in retail, payments, healthcare, financial services, higher education,
hospitality, government and utilities.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 14
Columbus State University
cs.columbusstate.edu Booth 16
The TSYS School of Computer Science at Columbus State University offers
a Master's degree in Applied Computer Science with an Information
Assurance track. The degree can be completed face to face or entirely
online. There is no additional fee for out of state students. CSU is a
DHS/NSA National Center of Academic Excellence in Cyber Defense
Education and has been rated a top online program by GoGrad.com and
GetEducation.com. We offer our students hands on experience in
cybersecurity.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 15
CyberSecJobs.com
cybersecjobs.com Booth 22
CyberSecJobs.com is a veteran-owned career site and job fair company for
professionals and students seeking employment in the cyber security community.
Our goal is to provide information so you find the career that best suits your needs.
We offer:
Intelligence that informs you to make better career choices. Learn who is
hiring, the types of positions available, and the skill sets employers are seeking, all
in one place. You’ll find employers and jobs that you didn’t even know existed.
Public and Private profile settings so you control your visibility to employers.
Some skill sets are in very high demand and you may be wary of being contacted
by too many recruiters after you create a profile and upload your resume. With
CyberSecJobs.com, you control your visibility to employers.
Educational content so you understand how to job search more successfully.
Each job search is unique, but your career will be a better fit with less effort, if
you’re more informed.
Job Alerts so you can search more efficiently. Stay on top of new opportunities,
every day. Job alerts notify you via email when new positions that match your
search criteria are posted.
CyberSecJobs.com in the Community
To stay abreast of critical issues as well as to support the cyber security community,
CyberSecJobs.com is an active participant in many industry and community
programs. We participate by managing hiring events, providing resume reviews, or
offering other career services at events including:
BSides Augusta
BSides DC
BSides Las Vegas
BSides Northern Virginia
BSides Salt Lake City
BSides San Diego
BSides San Antonio
BSides Tampa
CyberMaryland
CyberSecureGov
CyberTexas
National Cyber Summit
Women in Cybersecurity (WiCyS)
HIRING
 Vulnerability
Assessment
 Incident Response
 Systems Architecture
 Penetration Testing
 Digital Forensics
 Reverse Engineering
 Policy & Planning
 Systems Security
Analysis
 Systems Administration
 Systems Requirements
Planning
 Information Assurance
 Test & Evaluation
Page 16
CyberTraining 365
www.cybertraining365.com Booth 15
CyberTraining 365 is an online academy that offers nearly 1,000 hours of
relevant and cutting edge cyber security training. Our training provides the
most in demand industry certification prep courses including EC-Council,
CompTIA, (ISC)2 and Cisco; all taught by leading cyber security experts. All
of our offerings are aligned with the national initiative for cyber security
education (NICE) and ensure the most up-to-date information for this
constantly shifting field. With engaging content in a scenario-based format,
CyberTraining 365 uses bite-sized micro-learning methodology ensures
learners are not overwhelmed with information. On Demand LMS platform
has white-label capabilities ideal for internal training purposes.
SEEKING
Broadening women’s
interests and education in
the cybersecurity sector is
important to CyberTraining
365 and to show their
support of the Women in
CyberSecurity Conference
they are offering 100 seats
for their subscription-
based, online cyber
security certification
courses to members of
WiCyS.
CyberTraining 365 will be
providing 75 seats of six
months, free courses for
students and 25 seats for
non-students to further
cybersecurity education
opportunities to women
interested in starting or
furthering their careers. In
addition to these
scholarships,
CyberTraining 365 will also
be offering 50% off yearly
subscription vouchers to
general public/attendees of
WiCyS 2017.
Page 17
CyberWatch West Whatcom College
www.cyberwatchwest.org Booth 41
CyberWatch West (CWW) is a consortium of colleges, universities, high
schools and industry partners working together to grow and strengthen our
nation’s cybersecurity workforce. Our work is supported by a National
Science Foundation Advanced Technological Education (NSF-ATE) Grant.
The consortium is focused on building educational and industry partnerships
and delivering professional and student development programs. CWW
continues its mission to build a stronger cybersecurity infrastructure through
innovative online curricula, a unique faculty mentoring program, and robust
student competition initiatives. CWW is located at Whatcom Community
College in Bellingham, WA.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 18
Defense Point Security
defensepointsecurity.com Booth 32
Defense Point Security (DPS), an Accenture Federal Service Company, is one of
the largest U.S. solely focused Cyber Security providers. DPS is uniquely qualified
to provide both Commercial and Government focused cyber security solutions
capable of meeting Federal requirements, such as HIPAA, PCI, FISMA and NIST
while, being flexible to adapt solutions to meet both business and mission specific
requirements.
As a trusted partner since its inception in 2007, DPS and its founders have been
solely focused on cyber security allowing DPS to grow and maintain a workforce of
driven, educated and mission-focused security professionals. Through this focus,
DPS is a leader in designing and implementing cyber security solutions to architect,
detect, monitor and respond to targeted Advanced Persistent Threats (APT) as well
as Insider Threats.
DPS utilizes a holistic, closed loop, approach to defending cyber landscapes
integrating security engineering and architecture into system design during project
adoption to ensure compensating controls are “baked in” that meet the ever-
changing demands of “cloud services”; creating a virtual boundary. These cyber
defense mechanisms are only as effective as those poised to monitor, detect and
respond to threats presented.
DPS provides a new breed of security operations analysts through cross-pollination
of engineers and analysts to provide analysts with the necessary skill sets to refine
event sources to reduce false-positives and increase efficiency while ensuring true-
positives are not lost in the noise. Responding to and preparing for APTs or other
targeted attacks require an intricate knowledge of the current cyber landscape.
DPS provides offensive computer network services to map-out the cyber landscape
and provide senior leadership with the ability to take the current pulse of their cyber
security posture thereby enabling the most effective and efficient use of critical IT
budgets and resources. A comprehensive solution would not be complete without
integrating Technical Information System Security Officers (TISO)TM
into the
process from design inception to ongoing operations & maintenance ensuring
continuous monitoring is achieved and cyber defenses are checked and refined to
ensure not only monitoring but continuous improvement.
HIRING
 Cyber Intel Analyst
 Cybersecurity
Operations Engineer
 Director
 Incident Response
Analyst
 ISSO
 Linux Systems
Administrator
 McAfee DLP Engineer
 McAfee Professional
Services Engineer
 Penetration Tester
 Privileged Identity
Management
Implementation
Engineer
 Security Architect
 Security Assessor
 Security Control
Assessor
 Security
Documentation
Specialist
 Security Engineer
 Security Engineering
Lead
 Senior McAfee ePO
Engineer
 SOC Analyst
 SOC Day Shift Lead
 SOC Lead
 Splunk Engineer
 TripWire IP360 SME
Page 19
Department of Homeland Security
www.dhs.gov/office-intelligence-and-analysis Booth 5
The Office of Intelligence and Analysis supports the Department of
Homeland Security by providing timely and actionable intelligence and
analytic products to other DHS components, Intelligence Community
agencies, and other federal, state, local, tribal, territorial, and private sector
stakeholders. Our focus is on threats to aviation safety, border security and
cyber networks.
HIRING
2018 Summer Internship
Program
 Cyber Intelligence
Analysts
 Intelligence Analysts
 Information
Management
Specialists
Page 20
Endgame
www.endgame.com Booth 39
Endgame is a leading endpoint security platform that transforms security
operations teams and incident responders from crime scene investigators
into hunters that prevent damage and loss, and dramatically reduces the
time and cost associated with incident response and compromise
assessment. Endgame’s platform uses machine learning and data science to
prevent and detect unique attacks at the earliest and every stage of the
attack lifecycle. Endgame’s integrated response stops attacks without
disrupting normal business operations. For more information or to see our
job openings, visit www.endgame.com. Also follow us on Twitter
@EndgameInc or seach EndgameInc on Facebook and LinkedIn.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 21
Facebook
facebook.com Booth C
Facebook's mission is to give people the power to share and make the world
more open and connected. People use Facebook to stay connected with
friends and family, to discover what's going on in the world, and to share and
express what matters to them.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 22
Fidelity Investments
leap.fidelitycareers.com Booth A
Helping people live the lives they want is our purpose. And while no one can
predict their financial future, in our experience when people have access to
the expertise needed to successfully manage their money, they feel more
confident, can make clearer decisions and achieve better results.
Discover what makes more than 40,000 employees so dedicated to and
passionate about being part of our award-winning team.
HIRING
Leap: Leap is Fidelity’s state
of the art development
program designed to equip
recent IT grads to become
best in class technologists.
During the 3 to 6 month
program, participants
experience enriched on-
boarding, personalized
mentoring and coaching, as
well as accelerated
technology, business and
professional training. Upon
completion of the program,
participants are placed in full-
time roles across Fidelity's
diverse organization.
Technology Internship
Program: An IT internship at
Fidelity allows participants to
work side by side with the
best technologists in the
industry--doing real and
meaningful work that has a
direct impact on our business
and customers. Our
internships will help you
develop the technology,
professional, and
interpersonal skills that will
be valuable throughout your
career.
Page 23
Google
careers.google.com Booth 7
Google is a global technology leader focused on improving the ways people
connect with information. Google’s innovations in web search and
advertising have made its website a top Internet property and its brand one
of the most recognized in the world.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 24
Harris
www.harris.com Booth 40
From ocean to orbit and everywhere in between, Harris provides mission-
critical solutions to connect, inform and protect the world. Harris is a proven
leader in tactical communications, geospatial systems and services, air
traffic management, environmental solutions, avionics and electronic
warfare, and space and intelligence.
HIRING
Internships, entry level and
experienced positions
open for
 Information Systems
Security Engineers
 Network Engineers
 Systems Administrators
 Systems Engineers
 Software Engineers
Page 25
Honeywell
www.honeywell.com Booth 30
Honeywell invents and manufactures technologies that address some of the
world’s most critical challenges around energy, safety, security, productivity
and global urbanization. We are uniquely positioned to blend physical
products with software to support connected systems that improve homes,
buildings, factories, utilities, vehicles and aircraft, and that enable a safer,
more comfortable and more productive world. Our solutions enhance the
quality of life of people around the globe and create new markets and even
new industries. Honeywell is building a smarter, safer, and more sustainable
world. That's the Power of Connected. That's the Power of Honeywell.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 26
IBM Security
www-03.ibm.com/employment/security Booth 31
IBM Security, with 7,500 dedicated professionals in 133 countries, delivers
intelligent, integrated security technology and services to out-think
cybercriminals, detect threats and respond quickly to breaches. We focus on
our client’s most critical needs: transforming their security programs;
optimizing security operations and response systems; and protecting critical
information.
HIRING
2017 IBM Security North
America Early Professional &
Intern Req IDs
US Security Full-Time
Requisitions
 74989BR X-Force
Command Center
Virtualization Engineer
Cambridge, MA
 81658BR Security
Correlation Engineer -
Xforce Protection Services
Atlanta, GA
 82532BR Performance
Marketing Professional
Multiple cities
 82853BR IT Security
Operations Desk Analyst
Multiple cities
 83725BR Software Test
Specialist
Littleton, MA
US Security Internships
 66610BR Security Services
Specialist - Internship
(Undergrad students)
Atlanta, GA
 81514BR Security Services
Specialist - Internship
(Graduate Students)
Atlanta, GA
 71876BR Security Services
Consultant Graduate
Student Internship
Multiple Cities, USA
 71877BR Security Services
Consultant Undergrad
Student Internship
Multiple Cities, USA
 66178BR 2017 Internship -
DevOps Developer
Multiple Cities, USA
Page 27
Institute for Defense Analyses
www.ida.org Booth 33
IDA is the Institute for Defense Analyses, a not-for-profit corporation that
operates three Federally Funded Research and Development Centers
(FFRDCs) in the public interest: the Systems and Analyses Center, the
Science and Technology Policy Institute, and the Center for Communications
and Computing. IDA provides objective analyses of national security issues
and related national challenges, particularly those requiring extraordinary
scientific and technical expertise.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 28
Intel
www.intel.com Booths 2&3
At Intel, our vision is to create and extend computing technology to connect
and enrich the lives of every person on earth. For interns or college
graduates like you, that means having access to amazing career-building
opportunities with a global impact. So join our culture of innovation and
exploration and enjoy the many experiences and perks we have to offer as
you help us pioneer advances in Information Security, software and many
other fields.
HIRING
 Information Security
 Internet of Things
 Software and Solutions
Page 29
Johns Hopkins
Applied Physics Laboratory
www.jhuapl.edu Booth 25
The Applied Physics Laboratory (APL) is a not-for-profit center for
engineering, research, and development. Located north of Washington, DC,
APL is a division of one of the world's premier research universities, The
Johns Hopkins University (JHU). The Laboratory has been a major asset to
the nation since it was organized to develop a critical World War II
technology in 1942. We recruit and hire the best and the brightest from top
colleges, and 68% of our recruits are engineers and scientists. We work on
more than 600 programs that protect our homeland and advance the nation's
vision in research and space science. APL solves complex research,
engineering, and analytical problems that present critical challenges to our
nation. That's how we decide what work we will pursue, and it's how we've
chosen to benchmark our success. Our sponsors include most of the
nation's pivotal government agencies. The expertise we bring includes highly
qualified and technically diverse teams with hands-on operational knowledge
of the military and security environments. We offer an outstanding and
creative staff, augmented by world-class facilities. APL is recognized as one
of the top entry-level employers in the United States. We have a wide variety
of career opportunities for new graduates with B.S., M.S., and PhD. degrees
in various technical fields.
HIRING
• Applied Mathematics
• Bioengineering
• Computer Engineering
• Computer Science
• Computer
Science/Engineering
• Electrical Engineering
• Electrical & Computer
Engineering
• Engineering
Mechanics
• Engineering Physics
• Info & Systems
Engineering
• Materials Science &
Engineering
• Mathematics
• Mechanical
Engineering
• Physics
• Systems Engineering
Full-time entry level and
summer internships
Page 30
Kroll
www.kroll.com/en-us Booth 21
Kroll is the leading global provider of risk solutions. For more than 40 years,
Kroll has helped clients make confident risk management decisions about
people, assets, operations and security through a wide range of
investigations, cyber security, due diligence and compliance, physical and
operational security and data and information management services.
Headquartered in New York with more than 35 offices in 20 countries, Kroll
has a multidisciplinary team of nearly 1,000 employees and serves a global
clientele of law firms, financial institutions, corporations, non-profit
institutions, government agencies and individuals.
For more information concerning regarding potential cyber security
opportunities: careers@kroll.com.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 31
Marine Corps Systems Command
www.marcorsyscom.marines.mil Booth 20
Marine Corps Systems Command (MCSC) serves as the Department of the
Navy's systems command for Marine Corps ground, amphibious, weapon
and information technology (IT) system programs, equipping and sustaining
Marine forces with current and future expeditionary and crisis-response
capabilities. MCSC has more than 600 engineers (mechanical, electrical,
computer, safety, aerospace, chemical, systems), scientists (computer,
physicist, mathematician, textile) and IT/Cyber/Information Assurance
professionals who support the design, development, testing and fielding of
Marine Corps systems supporting more than 180,000 Marines.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 32
MIT Lincoln Laboratory
www.ll.mit.edu Booth 29
As a Department of Defense Research and Development Laboratory, MIT
Lincoln Laboratory conducts research and development aimed at solutions
to problems critical to national security. The areas that constitute the core of
the work performed at Lincoln Laboratory are sensors, information extraction
(signal processing and embedded computing), communications, and
integrated sensing and decision support, all supported by a broad research
base in advanced electronics.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 33
National CyberWatch /
Prince George's Community College
www.nationalcyberwatch.org Booth 6
In October 2016, the National Science Foundation (NSF) awarded Prince
George's Community College a $4.8 million National Advanced
Technological Education (ATE) Center continuation grant for its National
CyberWatch Center project. The grant allows National CyberWatch to build
on a 10+-year foundation of success, as evidenced by four successive NSF
ATE grants since 2005.
National CyberWatch has achieved major national impact in cybersecurity
education by establishing and validating national and Federal education and
training standards; creating a new annual conference (Community College
Cyber Summit) focused on cybersecurity education at the community college
level; developing and validating cybersecurity skills using performance-based
assessments, which are scalable across many industry certifications,
curricula, job roles, and verticals; and building new cybersecurity curricula,
the first to align instructional design, skill practice facilities, cybersecurity
professional job performance standards, national workforce frameworks, and
industry needs, which are desperately needed to guide responsible
curriculum development for the new generation of Information Security
specialists, to name just a few of the Center’s more notable successes.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 34
Naval Sea Systems Command (NAVSEA)
www.navsea.navy.mil Booth 19
If you believe in making a real difference and want to contribute to something
that matters, then the Naval Sea Systems Command - NAVSEA - is the right
place for you. Comprised of more than 60,000 civilian and military personnel
in 33 global activities, professionals at NAVSEA have challenging and
rewarding careers working with teammates who are recognized leaders in
their fields. We are guided by our mission to engineer, build, buy and
maintain ships, submarines and combat systems on time and on cost for the
United States Navy. With a budget of nearly $30 billion, NAVSEA employees
perform critical and cutting-edge defense work in science and engineering,
program management, logistics, finance and technology.
NAVSEA headquarters in Washington D.C is comprised of command staff
and directorates and five affiliated Program Executive Offices (PEOs).
Ninety-five percent of our people work in field activities, including Warfare
Center Divisions, Naval Shipyards, Regional Maintenance Centers and
Supervisors of Shipbuilding. Each serves a unique and fundamental role in
executing NAVSEA's important mission.
Exciting work and career variety, excellent career advancement and training
opportunities, outstanding health benefits and, more importantly, the
extraordinary opportunity to make a difference in the world and our country is
what makes NAVSEA extraordinary.
Keeping America's Navy #1 in the World!
U.S. Citizenship is required.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 35
Navy Cyber Warfare Development Group
www.public.navy.mil/fcc-c10f/Pages/home.aspx Booth 35
The Navy Cyber Warfare Development Group (NCWDG) serves as the
Navy's Center for Cyber Warfare innovation. As directed by U.S. Fleet Cyber
Command, NCWDG civilian and military personnel discover and exploit
adversary vulnerabilities, delivering Cyber tactics and capabilities to the U.S.
Navy using rapid prototyping and acquisition authority.
HIRING
 Cyber Capability
Developer (Software
Engineering)
Page 36
Northrop Grumman
www.northropgrumman.com Booth 42
The Value of Putting Trusted Cyber on the Front Line of Your Operations.
In today’s conflicts, a new battlefield is arising – one where traditional
systems aren’t the only ones targeted. At Northrop Grumman, we create
unrivaled, full-spectrum cyber solutions to actively combat these threats. Our
offensive and defensive capabilities act as powerful deterrents, while built-in
resiliency hardens your systems so that when attacked, you can trust they
remain yours. That’s why we’re a leader in end-to-end Cyber for the modern
world.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 37
Office of the Director of National Intelligence –
IC Communities
www.intelligencecareers.gov/icmembers.html Booth 48
U.S. Intelligence Community
The U.S. Intelligence Community (IC) is a group of 17 federal intelligence
agencies working together to protect the United States of America. We focus
on an ever-expanding range of issues, from terrorist financing to drug
trafficking, from climate change and environmental issues to foreign
technology threats and nuclear proliferation.
To learn more about the intelligence community, visit:
www.intelligencecareers.gov/icmembers.html
The IC offers students a wide variety of excellent programs to get a jumpstart
on a career in intelligence.
For additional information, visit:
www.intelligencecareers.gov/icstudents.html
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 38
Palo Alto Networks
www.paloaltonetworks.com Booth 38
It is now cheaper than ever to conduct successful cyberattacks, which has
led to an onslaught of malicious activity against organizations, threatening
the foundations of trust in digital systems critical to business operations and
innovative advantage. By focusing on prevention, the Palo Alto Networks
Next-Generation Security Platform reduces cybersecurity risk to a
manageable degree, allowing organizations to compartmentalize their most
serious threats and focus on business operations.
HIRING
Internships and permanent
positions
Page 39
Protiviti
www.protiviti.com/US-en/careers Booth 4
Protiviti is a global consulting firm that helps companies solve problems in
finance, technology, operations, governance, risk and internal audit, and has
served more than 60 percent of Fortune 1000® and 35 percent of Fortune
Global 500® companies. Protiviti and our independently owned Member
Firms serve clients through a network of more than 70 locations in over 20
countries. We also work with smaller, growing companies, including those
looking to go public, as well as with government agencies. Ranked 80 on the
2017 Fortune 100 Best Companies to Work For® list, Protiviti is a wholly
owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half
is a member of the S&P 500 index.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 40
Raytheon
Raytheon.com Booth 17
Cyber Security and Information Operations and Information Assurance
(IO/IA) are matters we take very seriously indeed. And so do our customers,
from global governments to Fortune 500 companies. That’s why they trust us
to deliver the end-to-end offensive and defensive solutions that successfully
protect them from a wide range of internal and external threats including
breach, fraud, theft and sabotage. If you want to use your talent to make the
world a safer place, Raytheon is the place to pursue a career. After all, you’ll
be part of a dynamic and diverse global team that’s working together to solve
some of the most demanding challenges on the planet.
HIRING
 Cyber Security Engineer -
different levels
 Cyber Security Analyst
 Cyber Software
Developer
 Cyber Vulnerability
Researcher
 Cyber Technical Writer
 Industrial Security
Specialist
 Information Assurance
Specialist
 Network Engineer
 Project Manager
 Software Engineer
 Systems/Network
Administrator
 Systems Engineer
 Test/QA Engineer
 Threat Analyst
 Sr Cybersecurity
Consultant
 Sr Cyber Software
Developer
 Sr Information Security
Lead
 Sr Manager Systems
Engineering
 Sr Security Analyst
 Sr Security
Consultant/Architect
 Sr Security Engineer
 Sr Training Specialist
 Cyber Security Intern
 Systems Engineering
Intern
 Vulnerability Researcher
Intern
Page 41
Sandia National Laboratories
www.sandia.gov Booth 28
Sandia National Laboratories is the nation’s premier science and
engineering lab for national security and technology innovation. Our
technologies—which make our nation safer, improve human and
environmental health, and even boost the competitiveness of U.S. industry—
can truly change the world.
At Sandia, you’ll join some of the top minds in the country in solving difficult
challenges. While pursuing problems of real significance, you can expect
competitive pay, top-notch benefits, and a work-life balance that gives you
time to enjoy family, friends, and the rich cultural, educational, and
recreational opportunities that surround our sites in Albuquerque, NM, and
Livermore, CA.
HIRING
Please see the hiring
representatives in our
booth to learn about our
full-time opportunities and
internships.
Page 42
SANS Technology Institute
www.sans.edu Booth 36
The SANS Technology Institute is the only graduate program that combines SANS
technical training, recognized as the industry’s best, with leadership and
management curriculum specifically developed for the unique needs of aspiring
leaders.
As cyber attacks increase in volume and complexity, and organizations scramble to
keep pace, the career path for cybersecurity professionals is being transformed.
Leading an organization’s security efforts now requires more than technical
competence. Deep technical knowledge must be paired with the skills to lead
people, mobilize resources, and communicate across the organization.
Our master’s degree programs provide high-potential cybersecurity professionals
with the combination of cutting-edge knowledge and leadership skills that take
careers to the highest levels. Graduate certificate programs offer a shorter,
technically focused set of courses that sharpen your skills and keep your knowledge
current.
Students attend courses online and at weeklong intensive learning events in major
cities throughout the United States. Applications are accepted year-round.
Sign up for an online information session on our website at www.sans.edu/WiCyS.
SANS CyberTalent is a division of the SANS Institute focused on providing talent
management solutions at a time when cybersecurity sees a growing workforce
supply-demand imbalance. The CyberTalent systems approach offers solutions for
organizations looking to hire cybersecurity professionals or improve retention and
professional development programs for existing cybersecurity teams.
CyberTalent programs include the Immersion Academies - an intensive,
accelerated training program that provides SANS world-class training and GIAC
certifications to quickly and effectively launch careers in cybersecurity. The
Academies are 100% scholarship at no cost to the individual. They include our
VetSuccess Academy for transitioning veterans and the Women’s Immersion
Academy for women looking to enter the field. The Academies help employers
reduce hiring costs and improve hiring success.
Other CyberTalent tools and initiatives include aptitude and skills assessments,
virtual career fairs, and free online training modules in cybersecurity fundamentals.
Learn more about SANS CyberTalent programs at www.sans.org/cybertalent
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 43
State Farm
www.statefarm.com Booth 18
With more than 65,000 employees and 18,000 agents serving more than 80
million policies and accounts, State Farm® is proud to rely on the expertise of
one of the nation's largest IT teams. In an IT/Systems career at State Farm,
you'll benefit from size, security and the innovative spirit of an industry leader.
Now's the time to take your job to a better state and work for a company that
values all you have to offer.
For more information about the State Farm Insurance Companies, please
visit
https://www.statefarm.com/about-us/company-overview/company-profile/fast-
facts
For information about awesome State Farm careers, you can visit
www.statefarm.com/careers
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 44
Stroz Friedberg, an Aon company
www.strozfriedberg.com Booth 11
Stroz Friedberg, an Aon company, is a specialized risk management firm
built to help clients solve the complex challenges prevalent in today’s digital,
connected, and regulated world. We focus on cybersecurity, with leading
experts in digital forensics, incident response, and security science;
investigations; eDiscovery; and due diligence. We have assembled a
collection of the brightest minds in the industry, in fourteen locations across
the globe.
Come work for a company brimming with state-of-the art technologies and
boasting renowned experts who are devoted to navigating complex risks
stemming from both inside and outside an organization. Advance your
career and become a passionate part of our team solution to transform
companies abilities to better defend, respond, and leverage key intelligence
as together we aim to fortify a business world plagued by high-tech crime
and low-tech corruption. Stroz Friedberg is on an exciting growth trajectory,
and the size of our organization will let you stand-out and operate on the
front lines as an innovative fact-finder, allowing you to showcase
performance excellence and drive success for our clients, the firm, and
yourself.
HIRING
Along with our
experienced cyber security
opportunities in Digital
Forensics, Incident
Response and Proactive
Information Security, we
have a robust campus
recruiting program! Visit
our website to learn more
about our full-time Cyber
Associate program and our
ten-week Cyber Summer
Associate Internship.
Page 45
Target
www.target.com/careers Booth 10
Minneapolis-based Target Corporation (NYSE: TGT) serves guests at
around 1,800 stores and at Target.com. Since 1946, Target has given 5
percent of its profit to communities, that giving equals more than $4 million a
week. For more information, visit Target.com/Pressroom. For a behind-the-
scenes look at Target, visit ABullseyeView.com or follow @TargetNews on
Twitter.
HIRING
Please see the hiring
representatives in our
booth for open positions.
Page 46
Tennessee Tech
www.tntech.edu/ceroc Booth 9
CEROC / Computer Science @ Tennessee Tech
Are you looking for funding support for your education in Cybersecurity? Tennessee Tech
offers full Scholarships for both undergraduate (around $41,000 per year) and graduate
cybersecurity education (around $54,000 per year). We also offer diversity fellowships, teaching
and research assistantships for a doctoral degree in Cybersecurity.
The Cybersecurity Education, Research, and Outreach Center (CEROC) at Tennessee Tech
University, a NSA/DHS National Center of Academic Excellence in Cyber Defense Education
(CAE-CDE), is pleased to be the founding institution for the Women in Cybersecurity conference
and organization. We are proud to be one of the select institutions in the nation to offer the
CyberCorps SFS program for developing young men and women into the future cyber-defenders
of our nation’s infrastructure.
As evident in CEROC’s name, the focus of our center is three-fold:
 Education – helping secondary and post-secondary education professionals expand
their curriculum offerings and their own skillsets in the area of cybersecurity education
and providing a more holistic cyber experience for our students in their classrooms and
outside of classrooms.
 Research – working with a group of talented faculty researchers across a spectrum of
cyber areas ranging from cyber defense to cyber-physical systems to smart grid.
 Outreach – working through our student ambassadors to deliver educational and
mentoring programs to collegiate and K12 students encouraging their participation in
cybersecurity programs in their current and higher education careers.
Our cybersecurity program, delivered through the Department of Computer Science, is one of
four focus areas (cybersecurity, data science, high performance computing, and software
engineering). Our program is unique in approach offering students the opportunity to explore
areas of study which intersect with one another for a more complete educational experience. We
also sponsor extracurricular student programs through the CyberEagles and CyberEagles-W
student security club. The club provides an opportunity to meet current cyber professionals,
develop leadership and soft skills, as well as be exposed to other students’ research. Students
also have the opportunity to try out for our cybersecurity penetration testing team and our cyber-
defense team. All of these activities provide mentoring and career growth opportunities.
We are actively seeking new students to work in our bachelors, masters, and Ph.D.
programs.
Come join our team and experience the world of cybersecurity in its complete spectrum and
diversity. Learn more about CEROC at www.tntech.edu/ceroc. More information about the
Computer Science program can be found at:
www.tntech.edu/engineering/departments/csc/.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 47
University of Arizona
mis.eller.arizona.edu Booth 37
University of Arizona – Eller College of Management
Since pioneering one of the nation's first Management Information Systems
(MIS) curriculums in 1974, the MIS Department at The University of Arizona,
Eller College of Management has become a leader in IT education and
research.
U.S. News & World Report has ranked us a top-five program for over 28
consecutive years since the inception of the rankings in 1989 - making us
one of only three programs nationwide to maintain this status.
With over $85 million in research grants, state and industry support, our
program has initiated and participated in cutting edge research in big data
analytics, cybersecurity, group systems, artificial intelligence, and data
management projects while educating over 4500 undergraduate, 1550
graduate and 200 doctoral students. We offer both 100% online and ground
(in-person) programs.
We are a National Center of Academic Excellence in Information Assurance
Education (CAE-IAE) as designated by the National Information Assurance
Education and Training Program (NIETP) office under the authority of the
U.S. National Security Agency (NSA.)
Visit us online at mis.eller.arizona.edu
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 48
University of Texas Dallas
www.utdallas.edu Booth 23
The University of Texas at Dallas participates in the NSF CyberCorps®:
Scholarship for Service program which is designed to train students in the
technical cyber security domain in order to protect the government’s critical
information infrastructure. Scholarships are available at the graduate level to
cover full-time student expenses (including tuition, fees and a very generous
stipend).
For more information, please contact Janell Straach at
jstraach@utdallas.edu.
SEEKING
To learn more, talk to the
representatives in our
booth.
Page 49
University of Washington Bothell,
Computing & Software Systems Division
uwb.edu/cybersecurity Booth 27
Begin your graduate studies in the heart of Seattle’s Technology Corridor!
Our Master of Science in Cyber Security Engineering prepares you to detect
malicious attacks and defend networks against hackers, while training you to
make key management level decisions that will determine the security of
your infrastructure. With the convenience of our evening program, working
professionals no longer choose between the job they need and the education
they desire. Together, we are changing the future of STEM. Don’t have a
background in computer science? Looking to transition careers into cyber
security? Apply to our Graduate Certificate in Software Design &
Development with a few prerequisites. As women in cyber security, the
University of Washington Bothell’s School of STEM has exciting degree
paths for you. Visit uwb.edu/cybersecurity, e-mail cssgrad@uw.edu, or call
(425)352-5490 to sign up for an online or in-person information session to
learn how to become a cyber professional.
SEEKING
Cyber security is quickly
becoming the fastest
growth sector for software
engineering careers in the
nation. High demand for
skilled workers and a
shortage of trained
individuals has created an
increased average salary
for cyber professionals.
Our graduates will find
positions such as Security
Architects, Security
Software Developers,
Cryptanalysts, Security
Engineers, Security
Consultants, Ethical
Hackers and Network
Security Managers.
Page 50
Worcester Polytechnic Institute
www.wpi.edu Booth 13
A
B
C
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Ranked by the Wall Street Journal as #1 for faculty that best combine
research and teaching, Worcester Polytechnic Institute makes meaningful,
well-designed research a degree requirement for every student. Across
undergraduate and graduate programs, WPI faculty and students engage in
multidisciplinary research that addresses the major social, scientific, and
technological issues of our times.
SEEKING
To learn more, talk to the
representatives in our
booth.
CyberSecJobs.com | ClearedJobs.Net
The WiCyS Career Fair is produced by

Mais conteúdo relacionado

Destaque

Digital Single Market and Brexit (Eleonora Rosati)
Digital Single Market and Brexit (Eleonora Rosati)Digital Single Market and Brexit (Eleonora Rosati)
Digital Single Market and Brexit (Eleonora Rosati)Eleonora Rosati
 
The Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsThe Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsGood Funnel
 
Not fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipNot fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipChris Marsden
 
Utiliser Webpack dans une application Symfony
Utiliser Webpack dans une application SymfonyUtiliser Webpack dans une application Symfony
Utiliser Webpack dans une application SymfonyAlain Hippolyte
 
Campamento de Verano Surf Camp Almerimar 2017 ALMERIA
Campamento de Verano Surf Camp Almerimar 2017 ALMERIACampamento de Verano Surf Camp Almerimar 2017 ALMERIA
Campamento de Verano Surf Camp Almerimar 2017 ALMERIAVeleta3000
 
2017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 032820172017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 03282017CRUZ CERDA
 
L’Espace Entreprises Bretagne romantique accueille le Club Prescrire
L’Espace Entreprises Bretagne romantique accueille le Club PrescrireL’Espace Entreprises Bretagne romantique accueille le Club Prescrire
L’Espace Entreprises Bretagne romantique accueille le Club PrescrireEsperluette & Associés
 
Direto ao Ponto - DevOpsSummit Brasil
Direto ao Ponto - DevOpsSummit BrasilDireto ao Ponto - DevOpsSummit Brasil
Direto ao Ponto - DevOpsSummit BrasilVictor Hugo Germano
 
What we talk about when we talk about open ...
What we talk about when we talk about open ... What we talk about when we talk about open ...
What we talk about when we talk about open ... Ronald Macintyre
 
5 Estrategias para aumentar x4 tu tráfico web
5 Estrategias para aumentar x4 tu tráfico web5 Estrategias para aumentar x4 tu tráfico web
5 Estrategias para aumentar x4 tu tráfico webMiguel Florido
 
A Publisher's Survival Guide for the Platform Era
A Publisher's Survival Guide for the Platform EraA Publisher's Survival Guide for the Platform Era
A Publisher's Survival Guide for the Platform EraBloomberg Media
 
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model PerformanceMachine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model PerformanceT. Scott Clendaniel
 
FrenchWeb 500, le classement des entreprises de la tech française
FrenchWeb 500, le classement des entreprises de la tech françaiseFrenchWeb 500, le classement des entreprises de la tech française
FrenchWeb 500, le classement des entreprises de la tech françaiseFrenchWeb.fr
 
トレンドを探る AI と HPC の関係性
トレンドを探る AI と HPC の関係性トレンドを探る AI と HPC の関係性
トレンドを探る AI と HPC の関係性NVIDIA Japan
 
ぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまでぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまでShinichi Takahashi
 
Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsJonas Bonér
 
How to Craft Heart Stopping Content: "Annisms" by Ann Handley
How to Craft Heart Stopping Content: "Annisms" by Ann HandleyHow to Craft Heart Stopping Content: "Annisms" by Ann Handley
How to Craft Heart Stopping Content: "Annisms" by Ann HandleySue-Ann Bubacz
 
色彩センスのいらない配色講座
色彩センスのいらない配色講座色彩センスのいらない配色講座
色彩センスのいらない配色講座Mariko Yamaguchi
 
Deloitte Business Chemistry Report
Deloitte Business Chemistry ReportDeloitte Business Chemistry Report
Deloitte Business Chemistry ReportDendreon
 

Destaque (20)

Digital Single Market and Brexit (Eleonora Rosati)
Digital Single Market and Brexit (Eleonora Rosati)Digital Single Market and Brexit (Eleonora Rosati)
Digital Single Market and Brexit (Eleonora Rosati)
 
The Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsThe Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer Interviews
 
Not fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipNot fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarship
 
Utiliser Webpack dans une application Symfony
Utiliser Webpack dans une application SymfonyUtiliser Webpack dans une application Symfony
Utiliser Webpack dans une application Symfony
 
Campamento de Verano Surf Camp Almerimar 2017 ALMERIA
Campamento de Verano Surf Camp Almerimar 2017 ALMERIACampamento de Verano Surf Camp Almerimar 2017 ALMERIA
Campamento de Verano Surf Camp Almerimar 2017 ALMERIA
 
2017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 032820172017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 03282017
 
L’Espace Entreprises Bretagne romantique accueille le Club Prescrire
L’Espace Entreprises Bretagne romantique accueille le Club PrescrireL’Espace Entreprises Bretagne romantique accueille le Club Prescrire
L’Espace Entreprises Bretagne romantique accueille le Club Prescrire
 
Direto ao Ponto - DevOpsSummit Brasil
Direto ao Ponto - DevOpsSummit BrasilDireto ao Ponto - DevOpsSummit Brasil
Direto ao Ponto - DevOpsSummit Brasil
 
What we talk about when we talk about open ...
What we talk about when we talk about open ... What we talk about when we talk about open ...
What we talk about when we talk about open ...
 
5 Estrategias para aumentar x4 tu tráfico web
5 Estrategias para aumentar x4 tu tráfico web5 Estrategias para aumentar x4 tu tráfico web
5 Estrategias para aumentar x4 tu tráfico web
 
A Publisher's Survival Guide for the Platform Era
A Publisher's Survival Guide for the Platform EraA Publisher's Survival Guide for the Platform Era
A Publisher's Survival Guide for the Platform Era
 
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model PerformanceMachine Learning/ Data Science: Boosting Predictive Analytics Model Performance
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
 
FrenchWeb 500, le classement des entreprises de la tech française
FrenchWeb 500, le classement des entreprises de la tech françaiseFrenchWeb 500, le classement des entreprises de la tech française
FrenchWeb 500, le classement des entreprises de la tech française
 
トレンドを探る AI と HPC の関係性
トレンドを探る AI と HPC の関係性トレンドを探る AI と HPC の関係性
トレンドを探る AI と HPC の関係性
 
ぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまでぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまで
 
Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability Patterns
 
How to Craft Heart Stopping Content: "Annisms" by Ann Handley
How to Craft Heart Stopping Content: "Annisms" by Ann HandleyHow to Craft Heart Stopping Content: "Annisms" by Ann Handley
How to Craft Heart Stopping Content: "Annisms" by Ann Handley
 
Hoofdzaken App
Hoofdzaken AppHoofdzaken App
Hoofdzaken App
 
色彩センスのいらない配色講座
色彩センスのいらない配色講座色彩センスのいらない配色講座
色彩センスのいらない配色講座
 
Deloitte Business Chemistry Report
Deloitte Business Chemistry ReportDeloitte Business Chemistry Report
Deloitte Business Chemistry Report
 

Semelhante a WiCyS Career Fair Handbook

Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemBrett Campbell
 
Higher Education Computing - Best Practices for Cloud Migration
Higher Education Computing - Best Practices for Cloud MigrationHigher Education Computing - Best Practices for Cloud Migration
Higher Education Computing - Best Practices for Cloud MigrationMighty Guides, Inc.
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Sri Bharadwaj
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...Bloxx
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Lilminow
 
@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013atmicrosoft
 
reStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryreStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryKen Fuller
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
reStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryreStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryKen Fuller
 
reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...
reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...
reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...Ken Fuller
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 IssuePatrick Spencer
 
Developing A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeAshley Davis
 
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdfreStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdfKen Fuller
 

Semelhante a WiCyS Career Fair Handbook (20)

SEEN 11.1
SEEN 11.1SEEN 11.1
SEEN 11.1
 
mits brochure
mits brochuremits brochure
mits brochure
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security Ecosystem
 
Higher Education Computing - Best Practices for Cloud Migration
Higher Education Computing - Best Practices for Cloud MigrationHigher Education Computing - Best Practices for Cloud Migration
Higher Education Computing - Best Practices for Cloud Migration
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013@microsoft Conversations on Education 10/29/2013
@microsoft Conversations on Education 10/29/2013
 
reStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryreStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer Directory
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
reStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer DirectoryreStartEvents Colorado Cleared Virtual Career Fair Employer Directory
reStartEvents Colorado Cleared Virtual Career Fair Employer Directory
 
reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...
reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...
reStartEvents November 18th DC Metro Cleared Virtual Career Fair Employer Dir...
 
CIO Digest_July 2013 Issue
CIO Digest_July 2013 IssueCIO Digest_July 2013 Issue
CIO Digest_July 2013 Issue
 
CYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCOCYBER ARTICLE ON LMCO
CYBER ARTICLE ON LMCO
 
Developing A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On TimeDeveloping A Quality Product Within Budget And On Time
Developing A Quality Product Within Budget And On Time
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdfreStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
 
Master of Cyber Security Singapore
Master of Cyber Security SingaporeMaster of Cyber Security Singapore
Master of Cyber Security Singapore
 

Mais de ClearedJobs.Net

CI or FS Poly Cleared Job Fair Handbook | March 6
CI or FS Poly Cleared Job Fair Handbook | March 6CI or FS Poly Cleared Job Fair Handbook | March 6
CI or FS Poly Cleared Job Fair Handbook | March 6ClearedJobs.Net
 
Cleared Job Fair Handbook | February 22
Cleared Job Fair Handbook  |  February 22Cleared Job Fair Handbook  |  February 22
Cleared Job Fair Handbook | February 22ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1ClearedJobs.Net
 
Maximize the Return on Your Cleared Job Fair Investment
Maximize the Return on Your Cleared Job Fair InvestmentMaximize the Return on Your Cleared Job Fair Investment
Maximize the Return on Your Cleared Job Fair InvestmentClearedJobs.Net
 
Cleared Job Fair Handbook | November 15
Cleared Job Fair Handbook | November 15Cleared Job Fair Handbook | November 15
Cleared Job Fair Handbook | November 15ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | November 2
CI or FS Poly Cleared Job Fair Handbook | November 2CI or FS Poly Cleared Job Fair Handbook | November 2
CI or FS Poly Cleared Job Fair Handbook | November 2ClearedJobs.Net
 
Cleared Job Fair Handbook | October 5
Cleared Job Fair Handbook | October 5Cleared Job Fair Handbook | October 5
Cleared Job Fair Handbook | October 5ClearedJobs.Net
 
NCS Job Fair Handbook | September 20
NCS Job Fair Handbook | September 20NCS Job Fair Handbook | September 20
NCS Job Fair Handbook | September 20ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | September 7
CI or FS Poly Cleared Job Fair Handbook | September 7CI or FS Poly Cleared Job Fair Handbook | September 7
CI or FS Poly Cleared Job Fair Handbook | September 7ClearedJobs.Net
 
Cleared Job Fair Handbook | August 24
Cleared Job Fair Handbook | August 24Cleared Job Fair Handbook | August 24
Cleared Job Fair Handbook | August 24ClearedJobs.Net
 
Tips for Writing More Effective Job Postings
Tips for Writing More Effective Job PostingsTips for Writing More Effective Job Postings
Tips for Writing More Effective Job PostingsClearedJobs.Net
 
Cleared Job Fair Handbook | July 19
Cleared Job Fair Handbook | July 19Cleared Job Fair Handbook | July 19
Cleared Job Fair Handbook | July 19ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | June 7
CI or FS Poly Cleared Job Fair Handbook | June 7CI or FS Poly Cleared Job Fair Handbook | June 7
CI or FS Poly Cleared Job Fair Handbook | June 7ClearedJobs.Net
 
Cleared Job Fair Handbook | May 18
Cleared Job Fair Handbook | May 18Cleared Job Fair Handbook | May 18
Cleared Job Fair Handbook | May 18ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | May 4
CI or FS Poly Cleared Job Fair Handbook | May 4CI or FS Poly Cleared Job Fair Handbook | May 4
CI or FS Poly Cleared Job Fair Handbook | May 4ClearedJobs.Net
 
Cleared Job Fair Handbook | April 13
Cleared Job Fair Handbook | April 13Cleared Job Fair Handbook | April 13
Cleared Job Fair Handbook | April 13ClearedJobs.Net
 
Cleared Job Fair Handbook | March 2
Cleared Job Fair Handbook | March 2Cleared Job Fair Handbook | March 2
Cleared Job Fair Handbook | March 2ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | February 9
CI or FS Poly Cleared Job Fair Handbook | February 9CI or FS Poly Cleared Job Fair Handbook | February 9
CI or FS Poly Cleared Job Fair Handbook | February 9ClearedJobs.Net
 
Cleared Job Fair Handbook | November 16
Cleared Job Fair Handbook | November 16Cleared Job Fair Handbook | November 16
Cleared Job Fair Handbook | November 16ClearedJobs.Net
 
CI or FS Poly Cleared Job Fair Handbook | November 3
CI or FS Poly Cleared Job Fair Handbook | November 3CI or FS Poly Cleared Job Fair Handbook | November 3
CI or FS Poly Cleared Job Fair Handbook | November 3ClearedJobs.Net
 

Mais de ClearedJobs.Net (20)

CI or FS Poly Cleared Job Fair Handbook | March 6
CI or FS Poly Cleared Job Fair Handbook | March 6CI or FS Poly Cleared Job Fair Handbook | March 6
CI or FS Poly Cleared Job Fair Handbook | March 6
 
Cleared Job Fair Handbook | February 22
Cleared Job Fair Handbook  |  February 22Cleared Job Fair Handbook  |  February 22
Cleared Job Fair Handbook | February 22
 
CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1CI or FS Poly Cleared Job Fair Handbook | February 1
CI or FS Poly Cleared Job Fair Handbook | February 1
 
Maximize the Return on Your Cleared Job Fair Investment
Maximize the Return on Your Cleared Job Fair InvestmentMaximize the Return on Your Cleared Job Fair Investment
Maximize the Return on Your Cleared Job Fair Investment
 
Cleared Job Fair Handbook | November 15
Cleared Job Fair Handbook | November 15Cleared Job Fair Handbook | November 15
Cleared Job Fair Handbook | November 15
 
CI or FS Poly Cleared Job Fair Handbook | November 2
CI or FS Poly Cleared Job Fair Handbook | November 2CI or FS Poly Cleared Job Fair Handbook | November 2
CI or FS Poly Cleared Job Fair Handbook | November 2
 
Cleared Job Fair Handbook | October 5
Cleared Job Fair Handbook | October 5Cleared Job Fair Handbook | October 5
Cleared Job Fair Handbook | October 5
 
NCS Job Fair Handbook | September 20
NCS Job Fair Handbook | September 20NCS Job Fair Handbook | September 20
NCS Job Fair Handbook | September 20
 
CI or FS Poly Cleared Job Fair Handbook | September 7
CI or FS Poly Cleared Job Fair Handbook | September 7CI or FS Poly Cleared Job Fair Handbook | September 7
CI or FS Poly Cleared Job Fair Handbook | September 7
 
Cleared Job Fair Handbook | August 24
Cleared Job Fair Handbook | August 24Cleared Job Fair Handbook | August 24
Cleared Job Fair Handbook | August 24
 
Tips for Writing More Effective Job Postings
Tips for Writing More Effective Job PostingsTips for Writing More Effective Job Postings
Tips for Writing More Effective Job Postings
 
Cleared Job Fair Handbook | July 19
Cleared Job Fair Handbook | July 19Cleared Job Fair Handbook | July 19
Cleared Job Fair Handbook | July 19
 
CI or FS Poly Cleared Job Fair Handbook | June 7
CI or FS Poly Cleared Job Fair Handbook | June 7CI or FS Poly Cleared Job Fair Handbook | June 7
CI or FS Poly Cleared Job Fair Handbook | June 7
 
Cleared Job Fair Handbook | May 18
Cleared Job Fair Handbook | May 18Cleared Job Fair Handbook | May 18
Cleared Job Fair Handbook | May 18
 
CI or FS Poly Cleared Job Fair Handbook | May 4
CI or FS Poly Cleared Job Fair Handbook | May 4CI or FS Poly Cleared Job Fair Handbook | May 4
CI or FS Poly Cleared Job Fair Handbook | May 4
 
Cleared Job Fair Handbook | April 13
Cleared Job Fair Handbook | April 13Cleared Job Fair Handbook | April 13
Cleared Job Fair Handbook | April 13
 
Cleared Job Fair Handbook | March 2
Cleared Job Fair Handbook | March 2Cleared Job Fair Handbook | March 2
Cleared Job Fair Handbook | March 2
 
CI or FS Poly Cleared Job Fair Handbook | February 9
CI or FS Poly Cleared Job Fair Handbook | February 9CI or FS Poly Cleared Job Fair Handbook | February 9
CI or FS Poly Cleared Job Fair Handbook | February 9
 
Cleared Job Fair Handbook | November 16
Cleared Job Fair Handbook | November 16Cleared Job Fair Handbook | November 16
Cleared Job Fair Handbook | November 16
 
CI or FS Poly Cleared Job Fair Handbook | November 3
CI or FS Poly Cleared Job Fair Handbook | November 3CI or FS Poly Cleared Job Fair Handbook | November 3
CI or FS Poly Cleared Job Fair Handbook | November 3
 

WiCyS Career Fair Handbook

  • 1. WiCyS Career Fair Job Seeker Handbook #WiCySCareerFair Friday, March 31 3pm-6.30pm | Saturday, April 1 10.45am-1pm
  • 3. Page 3 Sponsor Floorplan Key A Fidelity Investments B Cisco C Facebook 1 AT&T 2+3 Intel 4 Protiviti 5 Department of Homeland Security 6 Nat’l Cyberwatch / Prince George's CC 7 Google 8 CERT Division of Carnegie Mellon, SW Engr Inst 9 Tennessee Tech 10 Target 11 Stroz Friedberg 12 Carnegie Mellon University-Heinz College 13 Worcester Polytechnic Institute 14 Coalfire 15 CyberTraining 365 16 Columbus State University 17 Raytheon 18 State Farm 19 Naval Sea Systems Command (NAVSEA) 20 Marine Corps Systems Command 21 Kroll 22 CyberSecJobs.com 23 University of Texas Dallas 24 Bank of America 25 Johns Hopkins Applied Physics Laboratory 27 University of Washington Bothell 28 Sandia National Labs 29 MIT Lincoln Laboratory 30 Honeywell 31 IBM Security 32 Defense Point Security 33 Institute for Defense Analyses 34 CISSE 35 Navy Cyber Warfare Development Group 36 SANS Technology Institute 37 University of Arizona 38 Palo Alto Networks 39 Endgame 40 Harris 41 CyberWatch West Whatcom College 42 Northrop Grumman 44 Adobe 45 Aetna 46 Carnegie Mellon, Info Networking Institute 47 48 ODNI - IC Communities (FBI, NSA)
  • 4. Page 4 Adobe www.adobe.com Booth 44 Adobe is known as a place where art intersects science — a place where data scientists, engineers, and researchers go when they want their ingenuity and creativity to have a real-world impact on the way people live, work and play with technology. Here, engineering means being part of a global company and creating solutions that millions recognize and use. You’ll build and develop incredible desktop and mobile products and services that transform the way people create digital content. And whether you want to manage teams and drive strategy or simply be the best at the development work you do, you’ll make your mark on products admired around the world. Not only that, Adobe is one of the largest data collection platforms in the world, managing approximately 35 petabytes of customer data and processing one trillion transactions per quarter. But it’s not just the quantity of data — it’s the quality of the work life that makes this an amazing time to be at Adobe. Join us to turn data into impact, your ideas into product and see your theories come to life. HIRING Please see the hiring representatives in our booth for open positions.
  • 5. Page 5 Aetna www.aetna.com Booth 45 As one of the nation's leading diversified health care benefits companies, Aetna provides people with information and resources to help them make better informed health care decisions. Aetna’s health insurance products include medical, pharmacy, dental, behavioral health, group life and disability plans. Aetna also provides extended services for health care management, workers' compensation administration and health information technology. HIRING Please see the hiring representatives in our booth for open positions.
  • 6. Page 6 AT&T www.att.com Booth 1 AT&T helps connect millions around the globe with leading entertainment, mobile, high-speed internet and voice services. Our people make it all happen. As the world’s largest provider of pay TV, our employees deliver entertainment to our customers in the U.S. and 11 Latin American countries. It’s also our teams that give our mobile customers the global coverage they need while helping businesses worldwide serve their customers better with mobility and secure cloud solutions. With our internships, development programs, and whole range of opportunities across all areas of our business, we’re always looking for the next generation of leaders and innovators ready to put their stamp on #LifeAtATT. Got a passion for the web and defending cyber threats? Learn what it takes to protect one of the world’s largest networks. Be the future today at www.att.jobs/college. And don’t forget to check out our on-campus events happening near you. HIRING Please see the hiring representatives in our booth for open positions.
  • 7. Page 7 Bank of America campus.bankofamerica.com Booth 24 To help make financial lives better, through the power of every connection. HIRING Undergraduate sophomores and juniors looking for summer internships in cyber security
  • 8. Page 8 Carnegie Mellon University-Heinz College www.heinz.cmu.edu Booth 12 Carnegie Mellon University - Heinz College: School of Information Systems & Management We offer graduate degree options designed for early careerists and experienced professionals. We offer the top-ranked online, hybrid and on- campus programs (master’s, Ph.D. and certificate) in cyber security in the world. As our world becomes increasingly digitized, the privacy, intellectual property and fraud risks continue to grow. These cyber threats are highly relevant to all sectors of the economy, which is driving a major talent shortage for the information security industry. Our programs are educating talented and highly motivated individuals to meet the growing needs in this field. Heinz College is at the nexus of technology, analytics and leadership. Our programs give students flexibility in structuring their studies and provide excellent career outcomes. You'll gain strong problem solving and management skills, strengthen your ability to communicate in the workplace, lead and participate in teams and apply your classroom learning in real-world settings. Our curriculum is skills- based and is reviewed regularly by employers who help us ensure we are teaching relevant, needed skills. Our alumni lead and manage public, private, and non-profit organizations in the US and around the world. Our Information Systems & Security programs provide skills that lead to careers at high tech firms (Google, Microsoft), consulting firms (PriceWaterhouseCoopers, Ernst & Young), the financial industry (Credit Suisse, JP Morgan Chase), the federal government and FFRDC's (Sandia). Our graduates go to work for companies in places like New York, Silicon Valley, San Francisco and Washington, DC. SEEKING Full-time, on-campus master’s program: Information Security Policy and Management (MSISPM) Full-time, on-campus generalist master’s degree with a concentration in cybersecurity: Information Systems Management (MISM) Part-time, online or on-campus master’s degree: Information Technology (MSIT) Full-time, on-campus Ph.D. program: Ph.D. in Information Systems and Management (PhD) Certificate program via hybrid delivery: CISO Certificate Program Our financial aid strategy supports the school's goal of enrolling and educating a talented, dynamic and diverse student body. Prospective students are encouraged to learn more about the SCHOLARSHIPS & FELLOWSHIPS we offer to our degree-seeking students including merit-based scholarships, partner-based scholarships and other funding (awarded at the time of admission by Heinz College) specific to their program of interest.
  • 9. Page 9 Carnegie Mellon University, Information Networking Institute www.ini.cmu.edu Booth 46 As a highly competitive department, the INI considers all accepted applicants for financial awards in an amount that varies based on need and merit. Through corporate and government programs, several unique opportunities in the form of partial and full tuition scholarships, fellowships and awards are available to INI students, including the CyberCorps® Scholarship for Service, Director's Fellowship, Presidential Fellowship, Executive Women's Forum INI Fellowship and others. To learn more about financial opportunities at the INI, visit ini.cmu.edu. SEEKING Scholarship for Service, Executive Women's Forum-INI Fellowship, Director's Fellowship
  • 10. Page 10 CERT Division of Carnegie Mellon, Software Engineering Institute www.cert.org Booth 8 The Software Engineering Institute (SEI) at Carnegie Mellon University conducts research and development in software and systems engineering, cybersecurity, and other related areas. Bringing innovation to the government The SEI is one of 10 Federally Funded Research and Development Centers (FFRDCs) sponsored by the U.S. Department of Defense (DoD), one of only three chartered under the Research and Development Laboratories category. Like all FFRDCs, the SEI is not for profit, is not part of industry, and cannot compete with other organizations. However, the SEI is the only FFRDC sponsored by the DoD that can work with non-DoD organizations. This enables us to bring private-sector innovations to the government in addition to the innovative and collaborative work we do with the university and with government agencies. We support government initiatives by conducting research and development that is objective, long-term, and free from the constraints of commercialism. Our Mission We support the defense of the United States by advancing the science, technologies, and practices needed to acquire, develop, operate, and sustain software systems that are innovative, affordable, trustworthy, and enduring. While the work of the SEI often focuses on the needs of the Department of Defense, we also work extensively with the private sector and academia in an array of disciplines. Our activities in the areas of research, prototyping, mission application, and technology transfer are heavily interrelated and are relevant to a broad range of problem sets. Closing the gap between research and use The SEI is unique in its ability to innovate, taking concepts through R&D and ultimately into use. We build on a strong foundation of theoretical research by creating prototypes, conducting demonstrations and real-world pilots, developing training, publishing our findings, and delivering capabilities that organizations can use. We have the hands-on technical expertise to harden critical infrastructure and support the missions of the DoD, the intelligence community, federal departments, government agencies, and law enforcement. Part of the Carnegie Mellon University Community The SEI is based at Carnegie Mellon University, a national and international leader in higher education and research and a university at the forefront of cyber missions and software initiatives. The university provides the SEI with infrastructure and business processes. Our technical staff are part of the university's world-class community of researchers and innovators. We collaborate with Carnegie Mellon University on major research initiatives, contributing to the university's intellectual capital through research, collaboration, teaching, and strong management practices. SEEKING To learn more, talk to the representatives in our booth.
  • 11. Page 11 Cisco www.cisco.com Booth B Cybersecurity is our top priority in the Security and Trust Organization. It includes investment in our people, process, technology and polices. Pervasive security requires employees, vendors, partners, and customers to understand their role in the cybersecurity equation. Embedding processes into the business helps us identify vulnerabilities and remediate issues quickly. Cisco continually invests in security and resilience innovations that help to mitigate today’s advanced threats. Our policies are designed to protect your organization and investments across people, processes, and technology. www.cisco.com/c/en/us/about/careers/university/software.html HIRING Please see the hiring representatives in our booth for open positions.
  • 12. Page 12 CISSE www.cisse.info Booth 34 For 21 years CISSE has supported Cyber Security educators, researchers and practitioners in their efforts to improve curricula and foster discussion of current & emerging trends. We gather annually for a three day conference to share ideas, present papers, listen to thought leaders and recharge. This year we will be at the JW Marriott Resort 7 Spa in Las Vegas, NV, June 12- 14, 2017. SEEKING To learn more, talk to the representatives in our booth.
  • 13. Page 13 Coalfire Systems www.coalfire.com Booth 14 Coalfire helps organizations comply with global financial, government, industry and healthcare mandates while helping build the IT infrastructure and security systems that will protect their business from security breaches and data theft. The company is a leading provider of IT advisory services for security in retail, payments, healthcare, financial services, higher education, hospitality, government and utilities. HIRING Please see the hiring representatives in our booth for open positions.
  • 14. Page 14 Columbus State University cs.columbusstate.edu Booth 16 The TSYS School of Computer Science at Columbus State University offers a Master's degree in Applied Computer Science with an Information Assurance track. The degree can be completed face to face or entirely online. There is no additional fee for out of state students. CSU is a DHS/NSA National Center of Academic Excellence in Cyber Defense Education and has been rated a top online program by GoGrad.com and GetEducation.com. We offer our students hands on experience in cybersecurity. SEEKING To learn more, talk to the representatives in our booth.
  • 15. Page 15 CyberSecJobs.com cybersecjobs.com Booth 22 CyberSecJobs.com is a veteran-owned career site and job fair company for professionals and students seeking employment in the cyber security community. Our goal is to provide information so you find the career that best suits your needs. We offer: Intelligence that informs you to make better career choices. Learn who is hiring, the types of positions available, and the skill sets employers are seeking, all in one place. You’ll find employers and jobs that you didn’t even know existed. Public and Private profile settings so you control your visibility to employers. Some skill sets are in very high demand and you may be wary of being contacted by too many recruiters after you create a profile and upload your resume. With CyberSecJobs.com, you control your visibility to employers. Educational content so you understand how to job search more successfully. Each job search is unique, but your career will be a better fit with less effort, if you’re more informed. Job Alerts so you can search more efficiently. Stay on top of new opportunities, every day. Job alerts notify you via email when new positions that match your search criteria are posted. CyberSecJobs.com in the Community To stay abreast of critical issues as well as to support the cyber security community, CyberSecJobs.com is an active participant in many industry and community programs. We participate by managing hiring events, providing resume reviews, or offering other career services at events including: BSides Augusta BSides DC BSides Las Vegas BSides Northern Virginia BSides Salt Lake City BSides San Diego BSides San Antonio BSides Tampa CyberMaryland CyberSecureGov CyberTexas National Cyber Summit Women in Cybersecurity (WiCyS) HIRING  Vulnerability Assessment  Incident Response  Systems Architecture  Penetration Testing  Digital Forensics  Reverse Engineering  Policy & Planning  Systems Security Analysis  Systems Administration  Systems Requirements Planning  Information Assurance  Test & Evaluation
  • 16. Page 16 CyberTraining 365 www.cybertraining365.com Booth 15 CyberTraining 365 is an online academy that offers nearly 1,000 hours of relevant and cutting edge cyber security training. Our training provides the most in demand industry certification prep courses including EC-Council, CompTIA, (ISC)2 and Cisco; all taught by leading cyber security experts. All of our offerings are aligned with the national initiative for cyber security education (NICE) and ensure the most up-to-date information for this constantly shifting field. With engaging content in a scenario-based format, CyberTraining 365 uses bite-sized micro-learning methodology ensures learners are not overwhelmed with information. On Demand LMS platform has white-label capabilities ideal for internal training purposes. SEEKING Broadening women’s interests and education in the cybersecurity sector is important to CyberTraining 365 and to show their support of the Women in CyberSecurity Conference they are offering 100 seats for their subscription- based, online cyber security certification courses to members of WiCyS. CyberTraining 365 will be providing 75 seats of six months, free courses for students and 25 seats for non-students to further cybersecurity education opportunities to women interested in starting or furthering their careers. In addition to these scholarships, CyberTraining 365 will also be offering 50% off yearly subscription vouchers to general public/attendees of WiCyS 2017.
  • 17. Page 17 CyberWatch West Whatcom College www.cyberwatchwest.org Booth 41 CyberWatch West (CWW) is a consortium of colleges, universities, high schools and industry partners working together to grow and strengthen our nation’s cybersecurity workforce. Our work is supported by a National Science Foundation Advanced Technological Education (NSF-ATE) Grant. The consortium is focused on building educational and industry partnerships and delivering professional and student development programs. CWW continues its mission to build a stronger cybersecurity infrastructure through innovative online curricula, a unique faculty mentoring program, and robust student competition initiatives. CWW is located at Whatcom Community College in Bellingham, WA. SEEKING To learn more, talk to the representatives in our booth.
  • 18. Page 18 Defense Point Security defensepointsecurity.com Booth 32 Defense Point Security (DPS), an Accenture Federal Service Company, is one of the largest U.S. solely focused Cyber Security providers. DPS is uniquely qualified to provide both Commercial and Government focused cyber security solutions capable of meeting Federal requirements, such as HIPAA, PCI, FISMA and NIST while, being flexible to adapt solutions to meet both business and mission specific requirements. As a trusted partner since its inception in 2007, DPS and its founders have been solely focused on cyber security allowing DPS to grow and maintain a workforce of driven, educated and mission-focused security professionals. Through this focus, DPS is a leader in designing and implementing cyber security solutions to architect, detect, monitor and respond to targeted Advanced Persistent Threats (APT) as well as Insider Threats. DPS utilizes a holistic, closed loop, approach to defending cyber landscapes integrating security engineering and architecture into system design during project adoption to ensure compensating controls are “baked in” that meet the ever- changing demands of “cloud services”; creating a virtual boundary. These cyber defense mechanisms are only as effective as those poised to monitor, detect and respond to threats presented. DPS provides a new breed of security operations analysts through cross-pollination of engineers and analysts to provide analysts with the necessary skill sets to refine event sources to reduce false-positives and increase efficiency while ensuring true- positives are not lost in the noise. Responding to and preparing for APTs or other targeted attacks require an intricate knowledge of the current cyber landscape. DPS provides offensive computer network services to map-out the cyber landscape and provide senior leadership with the ability to take the current pulse of their cyber security posture thereby enabling the most effective and efficient use of critical IT budgets and resources. A comprehensive solution would not be complete without integrating Technical Information System Security Officers (TISO)TM into the process from design inception to ongoing operations & maintenance ensuring continuous monitoring is achieved and cyber defenses are checked and refined to ensure not only monitoring but continuous improvement. HIRING  Cyber Intel Analyst  Cybersecurity Operations Engineer  Director  Incident Response Analyst  ISSO  Linux Systems Administrator  McAfee DLP Engineer  McAfee Professional Services Engineer  Penetration Tester  Privileged Identity Management Implementation Engineer  Security Architect  Security Assessor  Security Control Assessor  Security Documentation Specialist  Security Engineer  Security Engineering Lead  Senior McAfee ePO Engineer  SOC Analyst  SOC Day Shift Lead  SOC Lead  Splunk Engineer  TripWire IP360 SME
  • 19. Page 19 Department of Homeland Security www.dhs.gov/office-intelligence-and-analysis Booth 5 The Office of Intelligence and Analysis supports the Department of Homeland Security by providing timely and actionable intelligence and analytic products to other DHS components, Intelligence Community agencies, and other federal, state, local, tribal, territorial, and private sector stakeholders. Our focus is on threats to aviation safety, border security and cyber networks. HIRING 2018 Summer Internship Program  Cyber Intelligence Analysts  Intelligence Analysts  Information Management Specialists
  • 20. Page 20 Endgame www.endgame.com Booth 39 Endgame is a leading endpoint security platform that transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, and dramatically reduces the time and cost associated with incident response and compromise assessment. Endgame’s platform uses machine learning and data science to prevent and detect unique attacks at the earliest and every stage of the attack lifecycle. Endgame’s integrated response stops attacks without disrupting normal business operations. For more information or to see our job openings, visit www.endgame.com. Also follow us on Twitter @EndgameInc or seach EndgameInc on Facebook and LinkedIn. HIRING Please see the hiring representatives in our booth for open positions.
  • 21. Page 21 Facebook facebook.com Booth C Facebook's mission is to give people the power to share and make the world more open and connected. People use Facebook to stay connected with friends and family, to discover what's going on in the world, and to share and express what matters to them. HIRING Please see the hiring representatives in our booth for open positions.
  • 22. Page 22 Fidelity Investments leap.fidelitycareers.com Booth A Helping people live the lives they want is our purpose. And while no one can predict their financial future, in our experience when people have access to the expertise needed to successfully manage their money, they feel more confident, can make clearer decisions and achieve better results. Discover what makes more than 40,000 employees so dedicated to and passionate about being part of our award-winning team. HIRING Leap: Leap is Fidelity’s state of the art development program designed to equip recent IT grads to become best in class technologists. During the 3 to 6 month program, participants experience enriched on- boarding, personalized mentoring and coaching, as well as accelerated technology, business and professional training. Upon completion of the program, participants are placed in full- time roles across Fidelity's diverse organization. Technology Internship Program: An IT internship at Fidelity allows participants to work side by side with the best technologists in the industry--doing real and meaningful work that has a direct impact on our business and customers. Our internships will help you develop the technology, professional, and interpersonal skills that will be valuable throughout your career.
  • 23. Page 23 Google careers.google.com Booth 7 Google is a global technology leader focused on improving the ways people connect with information. Google’s innovations in web search and advertising have made its website a top Internet property and its brand one of the most recognized in the world. HIRING Please see the hiring representatives in our booth for open positions.
  • 24. Page 24 Harris www.harris.com Booth 40 From ocean to orbit and everywhere in between, Harris provides mission- critical solutions to connect, inform and protect the world. Harris is a proven leader in tactical communications, geospatial systems and services, air traffic management, environmental solutions, avionics and electronic warfare, and space and intelligence. HIRING Internships, entry level and experienced positions open for  Information Systems Security Engineers  Network Engineers  Systems Administrators  Systems Engineers  Software Engineers
  • 25. Page 25 Honeywell www.honeywell.com Booth 30 Honeywell invents and manufactures technologies that address some of the world’s most critical challenges around energy, safety, security, productivity and global urbanization. We are uniquely positioned to blend physical products with software to support connected systems that improve homes, buildings, factories, utilities, vehicles and aircraft, and that enable a safer, more comfortable and more productive world. Our solutions enhance the quality of life of people around the globe and create new markets and even new industries. Honeywell is building a smarter, safer, and more sustainable world. That's the Power of Connected. That's the Power of Honeywell. HIRING Please see the hiring representatives in our booth for open positions.
  • 26. Page 26 IBM Security www-03.ibm.com/employment/security Booth 31 IBM Security, with 7,500 dedicated professionals in 133 countries, delivers intelligent, integrated security technology and services to out-think cybercriminals, detect threats and respond quickly to breaches. We focus on our client’s most critical needs: transforming their security programs; optimizing security operations and response systems; and protecting critical information. HIRING 2017 IBM Security North America Early Professional & Intern Req IDs US Security Full-Time Requisitions  74989BR X-Force Command Center Virtualization Engineer Cambridge, MA  81658BR Security Correlation Engineer - Xforce Protection Services Atlanta, GA  82532BR Performance Marketing Professional Multiple cities  82853BR IT Security Operations Desk Analyst Multiple cities  83725BR Software Test Specialist Littleton, MA US Security Internships  66610BR Security Services Specialist - Internship (Undergrad students) Atlanta, GA  81514BR Security Services Specialist - Internship (Graduate Students) Atlanta, GA  71876BR Security Services Consultant Graduate Student Internship Multiple Cities, USA  71877BR Security Services Consultant Undergrad Student Internship Multiple Cities, USA  66178BR 2017 Internship - DevOps Developer Multiple Cities, USA
  • 27. Page 27 Institute for Defense Analyses www.ida.org Booth 33 IDA is the Institute for Defense Analyses, a not-for-profit corporation that operates three Federally Funded Research and Development Centers (FFRDCs) in the public interest: the Systems and Analyses Center, the Science and Technology Policy Institute, and the Center for Communications and Computing. IDA provides objective analyses of national security issues and related national challenges, particularly those requiring extraordinary scientific and technical expertise. HIRING Please see the hiring representatives in our booth for open positions.
  • 28. Page 28 Intel www.intel.com Booths 2&3 At Intel, our vision is to create and extend computing technology to connect and enrich the lives of every person on earth. For interns or college graduates like you, that means having access to amazing career-building opportunities with a global impact. So join our culture of innovation and exploration and enjoy the many experiences and perks we have to offer as you help us pioneer advances in Information Security, software and many other fields. HIRING  Information Security  Internet of Things  Software and Solutions
  • 29. Page 29 Johns Hopkins Applied Physics Laboratory www.jhuapl.edu Booth 25 The Applied Physics Laboratory (APL) is a not-for-profit center for engineering, research, and development. Located north of Washington, DC, APL is a division of one of the world's premier research universities, The Johns Hopkins University (JHU). The Laboratory has been a major asset to the nation since it was organized to develop a critical World War II technology in 1942. We recruit and hire the best and the brightest from top colleges, and 68% of our recruits are engineers and scientists. We work on more than 600 programs that protect our homeland and advance the nation's vision in research and space science. APL solves complex research, engineering, and analytical problems that present critical challenges to our nation. That's how we decide what work we will pursue, and it's how we've chosen to benchmark our success. Our sponsors include most of the nation's pivotal government agencies. The expertise we bring includes highly qualified and technically diverse teams with hands-on operational knowledge of the military and security environments. We offer an outstanding and creative staff, augmented by world-class facilities. APL is recognized as one of the top entry-level employers in the United States. We have a wide variety of career opportunities for new graduates with B.S., M.S., and PhD. degrees in various technical fields. HIRING • Applied Mathematics • Bioengineering • Computer Engineering • Computer Science • Computer Science/Engineering • Electrical Engineering • Electrical & Computer Engineering • Engineering Mechanics • Engineering Physics • Info & Systems Engineering • Materials Science & Engineering • Mathematics • Mechanical Engineering • Physics • Systems Engineering Full-time entry level and summer internships
  • 30. Page 30 Kroll www.kroll.com/en-us Booth 21 Kroll is the leading global provider of risk solutions. For more than 40 years, Kroll has helped clients make confident risk management decisions about people, assets, operations and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security and data and information management services. Headquartered in New York with more than 35 offices in 20 countries, Kroll has a multidisciplinary team of nearly 1,000 employees and serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies and individuals. For more information concerning regarding potential cyber security opportunities: careers@kroll.com. HIRING Please see the hiring representatives in our booth for open positions.
  • 31. Page 31 Marine Corps Systems Command www.marcorsyscom.marines.mil Booth 20 Marine Corps Systems Command (MCSC) serves as the Department of the Navy's systems command for Marine Corps ground, amphibious, weapon and information technology (IT) system programs, equipping and sustaining Marine forces with current and future expeditionary and crisis-response capabilities. MCSC has more than 600 engineers (mechanical, electrical, computer, safety, aerospace, chemical, systems), scientists (computer, physicist, mathematician, textile) and IT/Cyber/Information Assurance professionals who support the design, development, testing and fielding of Marine Corps systems supporting more than 180,000 Marines. HIRING Please see the hiring representatives in our booth for open positions.
  • 32. Page 32 MIT Lincoln Laboratory www.ll.mit.edu Booth 29 As a Department of Defense Research and Development Laboratory, MIT Lincoln Laboratory conducts research and development aimed at solutions to problems critical to national security. The areas that constitute the core of the work performed at Lincoln Laboratory are sensors, information extraction (signal processing and embedded computing), communications, and integrated sensing and decision support, all supported by a broad research base in advanced electronics. HIRING Please see the hiring representatives in our booth for open positions.
  • 33. Page 33 National CyberWatch / Prince George's Community College www.nationalcyberwatch.org Booth 6 In October 2016, the National Science Foundation (NSF) awarded Prince George's Community College a $4.8 million National Advanced Technological Education (ATE) Center continuation grant for its National CyberWatch Center project. The grant allows National CyberWatch to build on a 10+-year foundation of success, as evidenced by four successive NSF ATE grants since 2005. National CyberWatch has achieved major national impact in cybersecurity education by establishing and validating national and Federal education and training standards; creating a new annual conference (Community College Cyber Summit) focused on cybersecurity education at the community college level; developing and validating cybersecurity skills using performance-based assessments, which are scalable across many industry certifications, curricula, job roles, and verticals; and building new cybersecurity curricula, the first to align instructional design, skill practice facilities, cybersecurity professional job performance standards, national workforce frameworks, and industry needs, which are desperately needed to guide responsible curriculum development for the new generation of Information Security specialists, to name just a few of the Center’s more notable successes. SEEKING To learn more, talk to the representatives in our booth.
  • 34. Page 34 Naval Sea Systems Command (NAVSEA) www.navsea.navy.mil Booth 19 If you believe in making a real difference and want to contribute to something that matters, then the Naval Sea Systems Command - NAVSEA - is the right place for you. Comprised of more than 60,000 civilian and military personnel in 33 global activities, professionals at NAVSEA have challenging and rewarding careers working with teammates who are recognized leaders in their fields. We are guided by our mission to engineer, build, buy and maintain ships, submarines and combat systems on time and on cost for the United States Navy. With a budget of nearly $30 billion, NAVSEA employees perform critical and cutting-edge defense work in science and engineering, program management, logistics, finance and technology. NAVSEA headquarters in Washington D.C is comprised of command staff and directorates and five affiliated Program Executive Offices (PEOs). Ninety-five percent of our people work in field activities, including Warfare Center Divisions, Naval Shipyards, Regional Maintenance Centers and Supervisors of Shipbuilding. Each serves a unique and fundamental role in executing NAVSEA's important mission. Exciting work and career variety, excellent career advancement and training opportunities, outstanding health benefits and, more importantly, the extraordinary opportunity to make a difference in the world and our country is what makes NAVSEA extraordinary. Keeping America's Navy #1 in the World! U.S. Citizenship is required. HIRING Please see the hiring representatives in our booth for open positions.
  • 35. Page 35 Navy Cyber Warfare Development Group www.public.navy.mil/fcc-c10f/Pages/home.aspx Booth 35 The Navy Cyber Warfare Development Group (NCWDG) serves as the Navy's Center for Cyber Warfare innovation. As directed by U.S. Fleet Cyber Command, NCWDG civilian and military personnel discover and exploit adversary vulnerabilities, delivering Cyber tactics and capabilities to the U.S. Navy using rapid prototyping and acquisition authority. HIRING  Cyber Capability Developer (Software Engineering)
  • 36. Page 36 Northrop Grumman www.northropgrumman.com Booth 42 The Value of Putting Trusted Cyber on the Front Line of Your Operations. In today’s conflicts, a new battlefield is arising – one where traditional systems aren’t the only ones targeted. At Northrop Grumman, we create unrivaled, full-spectrum cyber solutions to actively combat these threats. Our offensive and defensive capabilities act as powerful deterrents, while built-in resiliency hardens your systems so that when attacked, you can trust they remain yours. That’s why we’re a leader in end-to-end Cyber for the modern world. HIRING Please see the hiring representatives in our booth for open positions.
  • 37. Page 37 Office of the Director of National Intelligence – IC Communities www.intelligencecareers.gov/icmembers.html Booth 48 U.S. Intelligence Community The U.S. Intelligence Community (IC) is a group of 17 federal intelligence agencies working together to protect the United States of America. We focus on an ever-expanding range of issues, from terrorist financing to drug trafficking, from climate change and environmental issues to foreign technology threats and nuclear proliferation. To learn more about the intelligence community, visit: www.intelligencecareers.gov/icmembers.html The IC offers students a wide variety of excellent programs to get a jumpstart on a career in intelligence. For additional information, visit: www.intelligencecareers.gov/icstudents.html HIRING Please see the hiring representatives in our booth for open positions.
  • 38. Page 38 Palo Alto Networks www.paloaltonetworks.com Booth 38 It is now cheaper than ever to conduct successful cyberattacks, which has led to an onslaught of malicious activity against organizations, threatening the foundations of trust in digital systems critical to business operations and innovative advantage. By focusing on prevention, the Palo Alto Networks Next-Generation Security Platform reduces cybersecurity risk to a manageable degree, allowing organizations to compartmentalize their most serious threats and focus on business operations. HIRING Internships and permanent positions
  • 39. Page 39 Protiviti www.protiviti.com/US-en/careers Booth 4 Protiviti is a global consulting firm that helps companies solve problems in finance, technology, operations, governance, risk and internal audit, and has served more than 60 percent of Fortune 1000® and 35 percent of Fortune Global 500® companies. Protiviti and our independently owned Member Firms serve clients through a network of more than 70 locations in over 20 countries. We also work with smaller, growing companies, including those looking to go public, as well as with government agencies. Ranked 80 on the 2017 Fortune 100 Best Companies to Work For® list, Protiviti is a wholly owned subsidiary of Robert Half (NYSE: RHI). Founded in 1948, Robert Half is a member of the S&P 500 index. HIRING Please see the hiring representatives in our booth for open positions.
  • 40. Page 40 Raytheon Raytheon.com Booth 17 Cyber Security and Information Operations and Information Assurance (IO/IA) are matters we take very seriously indeed. And so do our customers, from global governments to Fortune 500 companies. That’s why they trust us to deliver the end-to-end offensive and defensive solutions that successfully protect them from a wide range of internal and external threats including breach, fraud, theft and sabotage. If you want to use your talent to make the world a safer place, Raytheon is the place to pursue a career. After all, you’ll be part of a dynamic and diverse global team that’s working together to solve some of the most demanding challenges on the planet. HIRING  Cyber Security Engineer - different levels  Cyber Security Analyst  Cyber Software Developer  Cyber Vulnerability Researcher  Cyber Technical Writer  Industrial Security Specialist  Information Assurance Specialist  Network Engineer  Project Manager  Software Engineer  Systems/Network Administrator  Systems Engineer  Test/QA Engineer  Threat Analyst  Sr Cybersecurity Consultant  Sr Cyber Software Developer  Sr Information Security Lead  Sr Manager Systems Engineering  Sr Security Analyst  Sr Security Consultant/Architect  Sr Security Engineer  Sr Training Specialist  Cyber Security Intern  Systems Engineering Intern  Vulnerability Researcher Intern
  • 41. Page 41 Sandia National Laboratories www.sandia.gov Booth 28 Sandia National Laboratories is the nation’s premier science and engineering lab for national security and technology innovation. Our technologies—which make our nation safer, improve human and environmental health, and even boost the competitiveness of U.S. industry— can truly change the world. At Sandia, you’ll join some of the top minds in the country in solving difficult challenges. While pursuing problems of real significance, you can expect competitive pay, top-notch benefits, and a work-life balance that gives you time to enjoy family, friends, and the rich cultural, educational, and recreational opportunities that surround our sites in Albuquerque, NM, and Livermore, CA. HIRING Please see the hiring representatives in our booth to learn about our full-time opportunities and internships.
  • 42. Page 42 SANS Technology Institute www.sans.edu Booth 36 The SANS Technology Institute is the only graduate program that combines SANS technical training, recognized as the industry’s best, with leadership and management curriculum specifically developed for the unique needs of aspiring leaders. As cyber attacks increase in volume and complexity, and organizations scramble to keep pace, the career path for cybersecurity professionals is being transformed. Leading an organization’s security efforts now requires more than technical competence. Deep technical knowledge must be paired with the skills to lead people, mobilize resources, and communicate across the organization. Our master’s degree programs provide high-potential cybersecurity professionals with the combination of cutting-edge knowledge and leadership skills that take careers to the highest levels. Graduate certificate programs offer a shorter, technically focused set of courses that sharpen your skills and keep your knowledge current. Students attend courses online and at weeklong intensive learning events in major cities throughout the United States. Applications are accepted year-round. Sign up for an online information session on our website at www.sans.edu/WiCyS. SANS CyberTalent is a division of the SANS Institute focused on providing talent management solutions at a time when cybersecurity sees a growing workforce supply-demand imbalance. The CyberTalent systems approach offers solutions for organizations looking to hire cybersecurity professionals or improve retention and professional development programs for existing cybersecurity teams. CyberTalent programs include the Immersion Academies - an intensive, accelerated training program that provides SANS world-class training and GIAC certifications to quickly and effectively launch careers in cybersecurity. The Academies are 100% scholarship at no cost to the individual. They include our VetSuccess Academy for transitioning veterans and the Women’s Immersion Academy for women looking to enter the field. The Academies help employers reduce hiring costs and improve hiring success. Other CyberTalent tools and initiatives include aptitude and skills assessments, virtual career fairs, and free online training modules in cybersecurity fundamentals. Learn more about SANS CyberTalent programs at www.sans.org/cybertalent SEEKING To learn more, talk to the representatives in our booth.
  • 43. Page 43 State Farm www.statefarm.com Booth 18 With more than 65,000 employees and 18,000 agents serving more than 80 million policies and accounts, State Farm® is proud to rely on the expertise of one of the nation's largest IT teams. In an IT/Systems career at State Farm, you'll benefit from size, security and the innovative spirit of an industry leader. Now's the time to take your job to a better state and work for a company that values all you have to offer. For more information about the State Farm Insurance Companies, please visit https://www.statefarm.com/about-us/company-overview/company-profile/fast- facts For information about awesome State Farm careers, you can visit www.statefarm.com/careers HIRING Please see the hiring representatives in our booth for open positions.
  • 44. Page 44 Stroz Friedberg, an Aon company www.strozfriedberg.com Booth 11 Stroz Friedberg, an Aon company, is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected, and regulated world. We focus on cybersecurity, with leading experts in digital forensics, incident response, and security science; investigations; eDiscovery; and due diligence. We have assembled a collection of the brightest minds in the industry, in fourteen locations across the globe. Come work for a company brimming with state-of-the art technologies and boasting renowned experts who are devoted to navigating complex risks stemming from both inside and outside an organization. Advance your career and become a passionate part of our team solution to transform companies abilities to better defend, respond, and leverage key intelligence as together we aim to fortify a business world plagued by high-tech crime and low-tech corruption. Stroz Friedberg is on an exciting growth trajectory, and the size of our organization will let you stand-out and operate on the front lines as an innovative fact-finder, allowing you to showcase performance excellence and drive success for our clients, the firm, and yourself. HIRING Along with our experienced cyber security opportunities in Digital Forensics, Incident Response and Proactive Information Security, we have a robust campus recruiting program! Visit our website to learn more about our full-time Cyber Associate program and our ten-week Cyber Summer Associate Internship.
  • 45. Page 45 Target www.target.com/careers Booth 10 Minneapolis-based Target Corporation (NYSE: TGT) serves guests at around 1,800 stores and at Target.com. Since 1946, Target has given 5 percent of its profit to communities, that giving equals more than $4 million a week. For more information, visit Target.com/Pressroom. For a behind-the- scenes look at Target, visit ABullseyeView.com or follow @TargetNews on Twitter. HIRING Please see the hiring representatives in our booth for open positions.
  • 46. Page 46 Tennessee Tech www.tntech.edu/ceroc Booth 9 CEROC / Computer Science @ Tennessee Tech Are you looking for funding support for your education in Cybersecurity? Tennessee Tech offers full Scholarships for both undergraduate (around $41,000 per year) and graduate cybersecurity education (around $54,000 per year). We also offer diversity fellowships, teaching and research assistantships for a doctoral degree in Cybersecurity. The Cybersecurity Education, Research, and Outreach Center (CEROC) at Tennessee Tech University, a NSA/DHS National Center of Academic Excellence in Cyber Defense Education (CAE-CDE), is pleased to be the founding institution for the Women in Cybersecurity conference and organization. We are proud to be one of the select institutions in the nation to offer the CyberCorps SFS program for developing young men and women into the future cyber-defenders of our nation’s infrastructure. As evident in CEROC’s name, the focus of our center is three-fold:  Education – helping secondary and post-secondary education professionals expand their curriculum offerings and their own skillsets in the area of cybersecurity education and providing a more holistic cyber experience for our students in their classrooms and outside of classrooms.  Research – working with a group of talented faculty researchers across a spectrum of cyber areas ranging from cyber defense to cyber-physical systems to smart grid.  Outreach – working through our student ambassadors to deliver educational and mentoring programs to collegiate and K12 students encouraging their participation in cybersecurity programs in their current and higher education careers. Our cybersecurity program, delivered through the Department of Computer Science, is one of four focus areas (cybersecurity, data science, high performance computing, and software engineering). Our program is unique in approach offering students the opportunity to explore areas of study which intersect with one another for a more complete educational experience. We also sponsor extracurricular student programs through the CyberEagles and CyberEagles-W student security club. The club provides an opportunity to meet current cyber professionals, develop leadership and soft skills, as well as be exposed to other students’ research. Students also have the opportunity to try out for our cybersecurity penetration testing team and our cyber- defense team. All of these activities provide mentoring and career growth opportunities. We are actively seeking new students to work in our bachelors, masters, and Ph.D. programs. Come join our team and experience the world of cybersecurity in its complete spectrum and diversity. Learn more about CEROC at www.tntech.edu/ceroc. More information about the Computer Science program can be found at: www.tntech.edu/engineering/departments/csc/. SEEKING To learn more, talk to the representatives in our booth.
  • 47. Page 47 University of Arizona mis.eller.arizona.edu Booth 37 University of Arizona – Eller College of Management Since pioneering one of the nation's first Management Information Systems (MIS) curriculums in 1974, the MIS Department at The University of Arizona, Eller College of Management has become a leader in IT education and research. U.S. News & World Report has ranked us a top-five program for over 28 consecutive years since the inception of the rankings in 1989 - making us one of only three programs nationwide to maintain this status. With over $85 million in research grants, state and industry support, our program has initiated and participated in cutting edge research in big data analytics, cybersecurity, group systems, artificial intelligence, and data management projects while educating over 4500 undergraduate, 1550 graduate and 200 doctoral students. We offer both 100% online and ground (in-person) programs. We are a National Center of Academic Excellence in Information Assurance Education (CAE-IAE) as designated by the National Information Assurance Education and Training Program (NIETP) office under the authority of the U.S. National Security Agency (NSA.) Visit us online at mis.eller.arizona.edu SEEKING To learn more, talk to the representatives in our booth.
  • 48. Page 48 University of Texas Dallas www.utdallas.edu Booth 23 The University of Texas at Dallas participates in the NSF CyberCorps®: Scholarship for Service program which is designed to train students in the technical cyber security domain in order to protect the government’s critical information infrastructure. Scholarships are available at the graduate level to cover full-time student expenses (including tuition, fees and a very generous stipend). For more information, please contact Janell Straach at jstraach@utdallas.edu. SEEKING To learn more, talk to the representatives in our booth.
  • 49. Page 49 University of Washington Bothell, Computing & Software Systems Division uwb.edu/cybersecurity Booth 27 Begin your graduate studies in the heart of Seattle’s Technology Corridor! Our Master of Science in Cyber Security Engineering prepares you to detect malicious attacks and defend networks against hackers, while training you to make key management level decisions that will determine the security of your infrastructure. With the convenience of our evening program, working professionals no longer choose between the job they need and the education they desire. Together, we are changing the future of STEM. Don’t have a background in computer science? Looking to transition careers into cyber security? Apply to our Graduate Certificate in Software Design & Development with a few prerequisites. As women in cyber security, the University of Washington Bothell’s School of STEM has exciting degree paths for you. Visit uwb.edu/cybersecurity, e-mail cssgrad@uw.edu, or call (425)352-5490 to sign up for an online or in-person information session to learn how to become a cyber professional. SEEKING Cyber security is quickly becoming the fastest growth sector for software engineering careers in the nation. High demand for skilled workers and a shortage of trained individuals has created an increased average salary for cyber professionals. Our graduates will find positions such as Security Architects, Security Software Developers, Cryptanalysts, Security Engineers, Security Consultants, Ethical Hackers and Network Security Managers.
  • 50. Page 50 Worcester Polytechnic Institute www.wpi.edu Booth 13 A B C 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 Ranked by the Wall Street Journal as #1 for faculty that best combine research and teaching, Worcester Polytechnic Institute makes meaningful, well-designed research a degree requirement for every student. Across undergraduate and graduate programs, WPI faculty and students engage in multidisciplinary research that addresses the major social, scientific, and technological issues of our times. SEEKING To learn more, talk to the representatives in our booth.
  • 51. CyberSecJobs.com | ClearedJobs.Net The WiCyS Career Fair is produced by