Part-time Security Analysts – Challenge Night
Take the opportunity to obtain a cool technical job in Fox-IT's Security Operations Center (SOC) in Delft
Fox-IT cyber security Traineeship – September 2018
Are you aiming for a technical career in cyber security but you don’t want to limit yourself to one specialization?
For a more secure society!
Forensics: Windows 10 memory forensics (WO)
Analyze even the newest versions of an OS
Forensics: Structured data analysis
Research into structuring and analysing unstructured data.
Forensics: APFS Forensic Analysis
Analyze relevant new features and explain their significance in forensic investigations.
High Assurance (P&S): Clientportal
Ervaring met programmeren in Python & Django is een must om in aanmerking te komen voor deze (meewerk)stage.
analyze more effectively, profiling, piecing together different kinds of da
DetACT: Flow Detection
HTTP, (page)flow, state-changes
DetACT: Rule Layout Rendering
auto-layout, graph drawing, user interface design, front-end development
High Assurance: Side Channel Analysis on crypto algorithm in FPGA
Analyze possible side channel attacks on crypto FPGA platform.
MSS: Bro-SMB research
Detect multiple attacks relating to SMB/SMB2.
MSS / CTMp: Security notification service
Research into app development and notification schemes.
MSS: Detection of vulnerability scanning using machine based learning
MSS – Detection of cyber threats in SMBv3 protocol traffic
Keywords: Detection, SMB3, Protocol analysis, Detection methods, Encryption, Packet inspection, exploit detection Duration: 5-10 months Context:…
Threat Intelligence: DCE-RPC log generation with Bro
Network detection, network protocols, C++, binpac, Bro, SMB, DCE/RPC
Threat Intelligence: Generic Ransomware research
Research into the latest ransomware trends.
Threat Intelligence: Protocol agnostic bruteforce detection across many servers
Keywords: Duration: 5-10 months Context: HBO/WO thesis Compensation: 500 euro/month Context: Bruteforcing of credentials and the…
Threat Intelligence: Malware detection in endpoint events
Use knowledge of malware and threats to build software that detects unknown threats.