You are on page 1of 5

1

Classification: //SecureWorks/Confidential - Limited External Distribution:


IT SECURITY Trainee
Academy

2
© SecureWorks, Inc. Classification: //SecureWorks/Confidential - Limited External Distribution:
3 Months intensive Cybersecurity training
What to expect:
 Getting familiar with basic IT Security concepts starting with
the very first week;
 Learning about most used Security tools;
 Best guidance offered by Secureworks dedicated trainers;
 In depth knowledge about various types of malwares and most
common cyber attacks;
 Theoretical & practical modules;
 Shadowing & knowledge transfer with SWRX current
employees.

Last but not least…


 Employment contract for undetermined period;
 3 months payed program;
 Attractive benefits package
 Opportunity to become a Jr. IT Security Analyst after
completion;

3
© SecureWorks, Inc. Classification: //SecureWorks/Confidential - Limited External Distribution:
Requirements & Recruiting Process

Your profile: Key Recruitment Steps:


 Passionate about technology  Technical Written Test: 30 Technical Questions related to
CCNA Routing & Switching and CompTIA Security +
 Basic IT knowledge (Eliminatory Step)
 Deep interest towards the newest trends and related  Face to face Interview HR + Management (Eliminatory
practices in the field Step)
 Analytical person – you like to dig up for answers, to  1 month On the Class Training – Theoretical Module- full
investigate and to find solutions time program 09.00 - 18.00
 Out of the box thinking  Technical Written Test evaluating the knowledge gained
 Natural drive to become better every day in the first month (Eliminatory Step)
 2 months On the Job Training - Practical Module - full
time schedule 12x24 and 12x48 (can include night shifts).

4
© SecureWorks, Inc. Classification: //SecureWorks/Confidential - Limited External Distribution:
Network Security DLP
Malware hunting in enterprise
Host security
Cryptography
Advance Malware Protection (FireEye)
Anti-malware

Threat Hunting Memory Analysis


SIEM (Splunk)

NG endpoint security Vulnerability Management


(RedCloak / CarbonBlack)
Digital Data Acquisition
Incident Response

Windows Host Forensic


Cyber programs management
SOC architecture
Traffic Analysis

5
© SecureWorks, Inc. Classification: //SecureWorks/Confidential - Limited External Distribution:

You might also like