Published on Oct. 3, 2025

Intern – Cyber Security

Baloise

About the job

Your job in a nutshell

* Contract type: Internship * Duration: 6 months * Start date: January / February 2026

What to Expect

Reporting directly to the Cyber Security Analyst, you will support him and oversee the following activities:

Your responsibilities include, but are not limited to :

  • Conducts network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems, firewalls and host-based security systems
  • Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
  • Correlates activity across assets (endpoint, network, apps) and environments to identify patterns of anomalous activity
  • Reviews alerts and data from sensors, and documents formal, technical incident reports
  • Works with threat intelligence and/or threat-hunting teams
  • Support the Cyber Security Analyst to provides users with incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
  • Perform security standards testing against ICT Asset (Devices, Applications, Projects,… ) before implementation to ensure security

Threat and Vulnerability Management :

  • Research threats and vulnerabilities and, where appropriate, takes action to mitigate threats and remediate vulnerabilities
  • Reviews, assesses, and mitigates penetration tests and vulnerability assessments on information systems and infrastructure
  • Recommends, schedule sand/or applies fixes, security patches and any other measures required in the event of a security breach
  • Monitors security vulnerability information from vendors and third parties

Event Management :

  • Responds to and, where appropriate, resolves or escalates reported security incidents
  • Monitors system logs, SIEM tools and network traffic for unusual or suspicious activity. Interprets such activity and makes recommendations for resolution
  • Investigates and resolves security violations by providing postmortem analysis to illuminate the issues and possible solutions

Infrastructure Protection :

  • Participates in infrastructure projects to develop, plan and implement specifications for network and distributed system security technologies in support of key information systems
  • Support system hardening efforts

Risk and Control Assessment :

Implements or coordinates remediation required by audits, and documents exceptions as necessary

Performs system and application vulnerability testing

Participates in enterprise testing and assessment activities as a representative of Luxembourg business unit

What We Expect

  • Currently pursuing a Master’s degree (or final year of Bachelor’s) in Computer Science, Cybersecurity, Information Security, or a related field.
  • Solid understanding of cybersecurity fundamentals: risk management, vulnerability management, incident response, identity and access management.
  • Basic knowledge of networking concepts (TCP/IP, protocols, routers, firewalls).
  • Familiarity with operating systems, common protocols, and security standards.
  • Interest in security frameworks and regulations (ISO 27001, NIST, COBIT).
  • Ability to learn quickly and adapt to a dynamic environment.
  • Strong analytical and problem-solving mindset.
  • Team player with good communication skills.
  • Motivated, curious, and proactive.
  • High ethical standards and respect for confidentiality.

Nice-to-Have (not mandatory):

  • Exposure to security tools.
  • Basic scripting or automation skills.
  • Awareness of IT governance and compliance concepts.

To learn more about our company and benefits, visit https://careers.baloise.com/en_US/careers/JobDetail?jobId=19277

Apply Now

Required skills

English Compliance Risk Management Operating Systems NIST Vulnerability Assessment Penetration Testing IT Governance Data Analysis Tools COBIT Security Standards Network Monitoring Networking Concepts Firewalls ISO 27001 Intrusion Detection Systems Endpoint Security Threat Intelligence SIEM Tools Security Patching Network Security Technologies Vulnerability Management Incident Response Identity and Access Management Monitoring Tools Threat Detection Log Analysis Postmortem Analysis Cybersecurity Fundamentals