Summer Intern – Corporate IT – Security (PAID)

Internship Summary:

The Summer Corporate IT Intern will aid in delivering leading-edge information security controls and capabilities across critical and emerging enterprise processes and technologies. Interns will have the opportunity to work in group and individual environments to expand skills with hands-on assignments or projects addressing business and technical problems

Location:             JDA Global Headquarters – Scottsdale, AZ

Duration:             Anticipated 10 to 12 weeks [Start: May 22, 2017 – Early/Mid August, 2016]


  • Work with IT security associates and leadership to learn a variety of processes and contribute to the overall department goals
  • Assist with special projects related to security event logging and monitoring
  • Perform security log analysis and related digital forensics
  • Configure, run, and monitoring web application and server level vulnerability scanning tools
  • Analyze the results of scans, and provide feedback to security and technology management
  • Assist in various security documentation projects including internal facing security documentation and security sales documentation
  • Assist in documenting and implementing information security and control processes
Required Skills
  • Currently pursuing a Bachelor or Graduate Degree in Computer Engineering, Computer Science, Information Systems or Information Security
  • Currently a Junior or Senior in undergraduate studies or graduate student
  • Insatiable appetite to learn and a strong desire to pursue a career in information security
  • Ability to work independently and take initiative while also serving as a team player
  • Strong interpersonal skills, excellent written and verbal communication skills
  • Ability to interact effectively with Associates across all levels of the organization and variety of cultures
  • Critical thinking, excellent research, and strong analytical skills with superb attention-to-detail

Highly Preferred:

  • Experience with security monitoring, vulnerability scanning, and log analysis tools (triage, incident analysis, remediation)
  • Working knowledge of attack methods and mitigation strategies including DDOS, Man in the Middle, Brute Force, SQL Injections, Cross-Site Scripting, Cross-Site Forgery Request, etc
  • Working knowledge of web, database, and OS server configuration
  • Understanding of Cyber threats including how malicious code works and proliferates
  • Understanding of Information Security frameworks (NIST, ISO, COBIT) and principles


Join the conversation online by connecting with us on Twitter @JDASoftware @JDACareers and Facebook (

Also, check out JDA’s blog – Supply Chain Nation – the platform for supply chain trends and innovations at